From cbf97d3e192ab6c25d2a6a2fa9fa25a43ad79180 Mon Sep 17 00:00:00 2001 From: Cisco Talos CNA Date: Tue, 19 Apr 2022 11:47:58 -0400 Subject: [PATCH] Updating 2019 CVSS scores --- 2019/5xxx/CVE-2019-5010.json | 8 ++++++++ 2019/5xxx/CVE-2019-5011.json | 8 ++++++++ 2019/5xxx/CVE-2019-5012.json | 8 ++++++++ 2019/5xxx/CVE-2019-5013.json | 8 ++++++++ 2019/5xxx/CVE-2019-5014.json | 8 ++++++++ 2019/5xxx/CVE-2019-5015.json | 8 ++++++++ 2019/5xxx/CVE-2019-5016.json | 8 ++++++++ 2019/5xxx/CVE-2019-5017.json | 8 ++++++++ 2019/5xxx/CVE-2019-5018.json | 8 ++++++++ 2019/5xxx/CVE-2019-5019.json | 8 ++++++++ 2019/5xxx/CVE-2019-5020.json | 8 ++++++++ 2019/5xxx/CVE-2019-5021.json | 8 ++++++++ 2019/5xxx/CVE-2019-5023.json | 8 ++++++++ 2019/5xxx/CVE-2019-5024.json | 8 ++++++++ 2019/5xxx/CVE-2019-5029.json | 8 ++++++++ 2019/5xxx/CVE-2019-5030.json | 8 ++++++++ 2019/5xxx/CVE-2019-5031.json | 8 ++++++++ 2019/5xxx/CVE-2019-5032.json | 8 ++++++++ 2019/5xxx/CVE-2019-5033.json | 8 ++++++++ 2019/5xxx/CVE-2019-5034.json | 8 ++++++++ 2019/5xxx/CVE-2019-5035.json | 8 ++++++++ 2019/5xxx/CVE-2019-5036.json | 8 ++++++++ 2019/5xxx/CVE-2019-5037.json | 8 ++++++++ 2019/5xxx/CVE-2019-5038.json | 8 ++++++++ 2019/5xxx/CVE-2019-5039.json | 8 ++++++++ 2019/5xxx/CVE-2019-5040.json | 8 ++++++++ 2019/5xxx/CVE-2019-5041.json | 8 ++++++++ 2019/5xxx/CVE-2019-5042.json | 8 ++++++++ 2019/5xxx/CVE-2019-5043.json | 8 ++++++++ 2019/5xxx/CVE-2019-5045.json | 8 ++++++++ 2019/5xxx/CVE-2019-5046.json | 8 ++++++++ 2019/5xxx/CVE-2019-5047.json | 8 ++++++++ 2019/5xxx/CVE-2019-5048.json | 8 ++++++++ 2019/5xxx/CVE-2019-5050.json | 8 ++++++++ 2019/5xxx/CVE-2019-5051.json | 8 ++++++++ 2019/5xxx/CVE-2019-5052.json | 8 ++++++++ 2019/5xxx/CVE-2019-5053.json | 8 ++++++++ 2019/5xxx/CVE-2019-5054.json | 8 ++++++++ 2019/5xxx/CVE-2019-5055.json | 8 ++++++++ 2019/5xxx/CVE-2019-5057.json | 8 ++++++++ 2019/5xxx/CVE-2019-5058.json | 8 ++++++++ 2019/5xxx/CVE-2019-5059.json | 8 ++++++++ 2019/5xxx/CVE-2019-5060.json | 8 ++++++++ 2019/5xxx/CVE-2019-5061.json | 8 ++++++++ 2019/5xxx/CVE-2019-5062.json | 8 ++++++++ 2019/5xxx/CVE-2019-5063.json | 8 ++++++++ 2019/5xxx/CVE-2019-5064.json | 8 ++++++++ 2019/5xxx/CVE-2019-5065.json | 8 ++++++++ 2019/5xxx/CVE-2019-5066.json | 8 ++++++++ 2019/5xxx/CVE-2019-5067.json | 8 ++++++++ 2019/5xxx/CVE-2019-5068.json | 8 ++++++++ 2019/5xxx/CVE-2019-5069.json | 8 ++++++++ 2019/5xxx/CVE-2019-5070.json | 8 ++++++++ 2019/5xxx/CVE-2019-5071.json | 8 ++++++++ 2019/5xxx/CVE-2019-5072.json | 8 ++++++++ 2019/5xxx/CVE-2019-5076.json | 8 ++++++++ 2019/5xxx/CVE-2019-5083.json | 8 ++++++++ 2019/5xxx/CVE-2019-5084.json | 8 ++++++++ 2019/5xxx/CVE-2019-5085.json | 8 ++++++++ 2019/5xxx/CVE-2019-5086.json | 8 ++++++++ 2019/5xxx/CVE-2019-5087.json | 8 ++++++++ 2019/5xxx/CVE-2019-5088.json | 8 ++++++++ 2019/5xxx/CVE-2019-5089.json | 8 ++++++++ 2019/5xxx/CVE-2019-5090.json | 8 ++++++++ 2019/5xxx/CVE-2019-5091.json | 8 ++++++++ 2019/5xxx/CVE-2019-5092.json | 8 ++++++++ 2019/5xxx/CVE-2019-5093.json | 8 ++++++++ 2019/5xxx/CVE-2019-5094.json | 8 ++++++++ 2019/5xxx/CVE-2019-5096.json | 8 ++++++++ 2019/5xxx/CVE-2019-5097.json | 8 ++++++++ 2019/5xxx/CVE-2019-5099.json | 8 ++++++++ 2019/5xxx/CVE-2019-5100.json | 8 ++++++++ 2019/5xxx/CVE-2019-5101.json | 8 ++++++++ 2019/5xxx/CVE-2019-5102.json | 8 ++++++++ 2019/5xxx/CVE-2019-5105.json | 8 ++++++++ 2019/5xxx/CVE-2019-5108.json | 8 ++++++++ 2019/5xxx/CVE-2019-5109.json | 8 ++++++++ 2019/5xxx/CVE-2019-5110.json | 8 ++++++++ 2019/5xxx/CVE-2019-5111.json | 8 ++++++++ 2019/5xxx/CVE-2019-5112.json | 8 ++++++++ 2019/5xxx/CVE-2019-5114.json | 8 ++++++++ 2019/5xxx/CVE-2019-5116.json | 8 ++++++++ 2019/5xxx/CVE-2019-5117.json | 8 ++++++++ 2019/5xxx/CVE-2019-5119.json | 8 ++++++++ 2019/5xxx/CVE-2019-5120.json | 8 ++++++++ 2019/5xxx/CVE-2019-5121.json | 8 ++++++++ 2019/5xxx/CVE-2019-5122.json | 8 ++++++++ 2019/5xxx/CVE-2019-5123.json | 8 ++++++++ 2019/5xxx/CVE-2019-5125.json | 8 ++++++++ 2019/5xxx/CVE-2019-5126.json | 8 ++++++++ 2019/5xxx/CVE-2019-5127.json | 8 ++++++++ 2019/5xxx/CVE-2019-5128.json | 8 ++++++++ 2019/5xxx/CVE-2019-5129.json | 8 ++++++++ 2019/5xxx/CVE-2019-5130.json | 8 ++++++++ 2019/5xxx/CVE-2019-5131.json | 8 ++++++++ 2019/5xxx/CVE-2019-5132.json | 8 ++++++++ 2019/5xxx/CVE-2019-5133.json | 8 ++++++++ 2019/5xxx/CVE-2019-5136.json | 8 ++++++++ 2019/5xxx/CVE-2019-5137.json | 8 ++++++++ 2019/5xxx/CVE-2019-5138.json | 8 ++++++++ 2019/5xxx/CVE-2019-5139.json | 8 ++++++++ 2019/5xxx/CVE-2019-5140.json | 8 ++++++++ 2019/5xxx/CVE-2019-5141.json | 8 ++++++++ 2019/5xxx/CVE-2019-5142.json | 8 ++++++++ 2019/5xxx/CVE-2019-5143.json | 8 ++++++++ 2019/5xxx/CVE-2019-5144.json | 8 ++++++++ 2019/5xxx/CVE-2019-5145.json | 8 ++++++++ 2019/5xxx/CVE-2019-5148.json | 8 ++++++++ 2019/5xxx/CVE-2019-5150.json | 8 ++++++++ 2019/5xxx/CVE-2019-5151.json | 8 ++++++++ 2019/5xxx/CVE-2019-5152.json | 8 ++++++++ 2019/5xxx/CVE-2019-5153.json | 8 ++++++++ 2019/5xxx/CVE-2019-5154.json | 8 ++++++++ 2019/5xxx/CVE-2019-5162.json | 8 ++++++++ 2019/5xxx/CVE-2019-5163.json | 8 ++++++++ 2019/5xxx/CVE-2019-5164.json | 8 ++++++++ 2019/5xxx/CVE-2019-5165.json | 8 ++++++++ 2019/5xxx/CVE-2019-5187.json | 8 ++++++++ 2019/5xxx/CVE-2019-5188.json | 8 ++++++++ 2020/13xxx/CVE-2020-13542.json | 8 ++++++++ 2020/13xxx/CVE-2020-13543.json | 8 ++++++++ 2020/13xxx/CVE-2020-13584.json | 8 ++++++++ 2020/28xxx/CVE-2020-28596.json | 8 ++++++++ 2020/6xxx/CVE-2020-6058.json | 8 ++++++++ 2020/6xxx/CVE-2020-6059.json | 8 ++++++++ 2020/6xxx/CVE-2020-6060.json | 8 ++++++++ 2020/6xxx/CVE-2020-6061.json | 8 ++++++++ 2020/6xxx/CVE-2020-6062.json | 8 ++++++++ 2020/6xxx/CVE-2020-6063.json | 8 ++++++++ 2020/6xxx/CVE-2020-6064.json | 8 ++++++++ 2020/6xxx/CVE-2020-6065.json | 8 ++++++++ 2020/6xxx/CVE-2020-6066.json | 8 ++++++++ 2020/6xxx/CVE-2020-6067.json | 8 ++++++++ 2020/6xxx/CVE-2020-6068.json | 8 ++++++++ 2020/6xxx/CVE-2020-6069.json | 8 ++++++++ 2020/6xxx/CVE-2020-6070.json | 8 ++++++++ 2020/6xxx/CVE-2020-6071.json | 8 ++++++++ 2020/6xxx/CVE-2020-6072.json | 8 ++++++++ 2020/6xxx/CVE-2020-6073.json | 8 ++++++++ 2020/6xxx/CVE-2020-6074.json | 8 ++++++++ 2020/6xxx/CVE-2020-6075.json | 8 ++++++++ 2020/6xxx/CVE-2020-6076.json | 8 ++++++++ 2020/6xxx/CVE-2020-6077.json | 8 ++++++++ 2020/6xxx/CVE-2020-6078.json | 8 ++++++++ 2020/6xxx/CVE-2020-6079.json | 8 ++++++++ 2020/6xxx/CVE-2020-6080.json | 8 ++++++++ 2020/6xxx/CVE-2020-6081.json | 8 ++++++++ 2020/6xxx/CVE-2020-6082.json | 8 ++++++++ 148 files changed, 1184 insertions(+) diff --git a/2019/5xxx/CVE-2019-5010.json b/2019/5xxx/CVE-2019-5010.json index b8b424500f4..1f9f0074e55 100644 --- a/2019/5xxx/CVE-2019-5010.json +++ b/2019/5xxx/CVE-2019-5010.json @@ -93,5 +93,13 @@ "value": "An exploitable denial-of-service vulnerability exists in the X509 certificate parser of Python.org Python 2.7.11 / 3.6.6. A specially crafted X509 certificate can cause a NULL pointer dereference, resulting in a denial of service. An attacker can initiate or accept TLS connections using crafted certificates to trigger this vulnerability." } ] + }, + "impact": { + "cvss": { + "baseScore": 5.9, + "baseSeverity": "Medium", + "vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H", + "version": "3.0" + } } } \ No newline at end of file diff --git a/2019/5xxx/CVE-2019-5011.json b/2019/5xxx/CVE-2019-5011.json index 04ed9bbd79b..9b1b592679c 100644 --- a/2019/5xxx/CVE-2019-5011.json +++ b/2019/5xxx/CVE-2019-5011.json @@ -58,5 +58,13 @@ "value": "An exploitable privilege escalation vulnerability exists in the helper service CleanMyMac X, version 4.20, due to improper updating. The application failed to remove the vulnerable components upon upgrading to the latest version, leaving the user open to attack. A user with local access can use this vulnerability to modify the file system as root. An attacker would need local access to the machine for a successful exploit." } ] + }, + "impact": { + "cvss": { + "baseScore": 7.1, + "baseSeverity": "High", + "vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:C/C:N/I:H/A:N", + "version": "3.0" + } } } \ No newline at end of file diff --git a/2019/5xxx/CVE-2019-5012.json b/2019/5xxx/CVE-2019-5012.json index efcb68e63f2..0d5ce8ebadd 100644 --- a/2019/5xxx/CVE-2019-5012.json +++ b/2019/5xxx/CVE-2019-5012.json @@ -58,5 +58,13 @@ "value": "An exploitable privilege escalation vulnerability exists in the Wacom, driver version 6.3.32-3, update helper service in the startProcess command. The command takes a user-supplied script argument and executes it under root context. A user with local access can use this vulnerability to raise their privileges to root. An attacker would need local access to the machine for a successful exploit." } ] + }, + "impact": { + "cvss": { + "baseScore": 7.8, + "baseSeverity": "High", + "vectorString": "CVSS:3.0/AV:L/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:N", + "version": "3.0" + } } } \ No newline at end of file diff --git a/2019/5xxx/CVE-2019-5013.json b/2019/5xxx/CVE-2019-5013.json index e34ffe63356..101361aeebc 100644 --- a/2019/5xxx/CVE-2019-5013.json +++ b/2019/5xxx/CVE-2019-5013.json @@ -58,5 +58,13 @@ "value": "An exploitable privilege escalation vulnerability exists in the Wacom, driver version 6.3.32-3, update helper service in the start/stopLaunchDProcess command. The command takes a user-supplied string argument and executes launchctl under root context. A user with local access can use this vulnerability to raise load arbitrary launchD agents. An attacker would need local access to the machine for a successful exploit." } ] + }, + "impact": { + "cvss": { + "baseScore": 7.1, + "baseSeverity": "High", + "vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:C/C:N/I:H/A:N", + "version": "3.0" + } } } \ No newline at end of file diff --git a/2019/5xxx/CVE-2019-5014.json b/2019/5xxx/CVE-2019-5014.json index daee654c9ec..2f0a2aa89d9 100644 --- a/2019/5xxx/CVE-2019-5014.json +++ b/2019/5xxx/CVE-2019-5014.json @@ -58,5 +58,13 @@ "value": "An exploitable improper access control vulnerability exists in the bluetooth low energy functionality of Winco Fireworks FireFly FW-1007 V2.0. An attacker can connect to the device to trigger this vulnerability." } ] + }, + "impact": { + "cvss": { + "baseScore": 6.5, + "baseSeverity": "Medium", + "vectorString": "CVSS:3.0/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", + "version": "3.0" + } } } \ No newline at end of file diff --git a/2019/5xxx/CVE-2019-5015.json b/2019/5xxx/CVE-2019-5015.json index b1c2ebc5ab6..ac3b161e8f4 100644 --- a/2019/5xxx/CVE-2019-5015.json +++ b/2019/5xxx/CVE-2019-5015.json @@ -64,5 +64,13 @@ "url": "http://www.securityfocus.com/bid/107436" } ] + }, + "impact": { + "cvss": { + "baseScore": 9.0, + "baseSeverity": "Critical", + "vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:N", + "version": "3.0" + } } } \ No newline at end of file diff --git a/2019/5xxx/CVE-2019-5016.json b/2019/5xxx/CVE-2019-5016.json index 35c00f1f7dc..6c756fdc058 100644 --- a/2019/5xxx/CVE-2019-5016.json +++ b/2019/5xxx/CVE-2019-5016.json @@ -66,5 +66,13 @@ "value": "An exploitable arbitrary memory read vulnerability exists in the KCodes NetUSB.ko kernel module which enables the ReadySHARE Printer functionality of at least two NETGEAR Nighthawk Routers and potentially several other vendors/products. A specially crafted index value can cause an invalid memory read, resulting in a denial of service or remote information disclosure. An unauthenticated attacker can send a crafted packet on the local network to trigger this vulnerability." } ] + }, + "impact": { + "cvss": { + "baseScore": 10.0, + "baseSeverity": null, + "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:N/A:H", + "version": "3.0" + } } } \ No newline at end of file diff --git a/2019/5xxx/CVE-2019-5017.json b/2019/5xxx/CVE-2019-5017.json index 6747a6a9329..7420dfaebd4 100644 --- a/2019/5xxx/CVE-2019-5017.json +++ b/2019/5xxx/CVE-2019-5017.json @@ -63,5 +63,13 @@ "value": "An exploitable information disclosure vulnerability exists in the KCodes NetUSB.ko kernel module that enables the ReadySHARE Printer functionality of at least two NETGEAR Nighthawk Routers and potentially several other vendors/products. An unauthenticated, remote attacker can craft and send a packet containing an opcode that will trigger the kernel module to return several addresses. One of which can be used to calculate the dynamic base address of the module for further exploitation." } ] + }, + "impact": { + "cvss": { + "baseScore": 5.8, + "baseSeverity": "Medium", + "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:C/C:L/I:N/A:N", + "version": "3.0" + } } } \ No newline at end of file diff --git a/2019/5xxx/CVE-2019-5018.json b/2019/5xxx/CVE-2019-5018.json index 6b93158b0b4..ecba75c39d7 100644 --- a/2019/5xxx/CVE-2019-5018.json +++ b/2019/5xxx/CVE-2019-5018.json @@ -83,5 +83,13 @@ "value": "An exploitable use after free vulnerability exists in the window function functionality of Sqlite3 3.26.0. A specially crafted SQL command can cause a use after free vulnerability, potentially resulting in remote code execution. An attacker can send a malicious SQL command to trigger this vulnerability." } ] + }, + "impact": { + "cvss": { + "baseScore": 8.1, + "baseSeverity": "High", + "vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H", + "version": "3.0" + } } } \ No newline at end of file diff --git a/2019/5xxx/CVE-2019-5019.json b/2019/5xxx/CVE-2019-5019.json index 70762ed957b..d14baccb2b6 100644 --- a/2019/5xxx/CVE-2019-5019.json +++ b/2019/5xxx/CVE-2019-5019.json @@ -58,5 +58,13 @@ "value": "A heap-based overflow vulnerability exists in the PowerPoint document conversion function of Rainbow PDF Office Server Document Converter V7.0 Pro R1 (7,0,2018,1113). While parsing Document Summary Property Set stream, the getSummaryInformation function is incorrectly checking the correlation between size and the number of properties in PropertySet packets, causing an out-of-bounds write that leads to heap corruption and consequent code execution." } ] + }, + "impact": { + "cvss": { + "baseScore": 8.8, + "baseSeverity": "High", + "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", + "version": "3.0" + } } } \ No newline at end of file diff --git a/2019/5xxx/CVE-2019-5020.json b/2019/5xxx/CVE-2019-5020.json index 3ed1e775c6c..0c65f4fb61b 100644 --- a/2019/5xxx/CVE-2019-5020.json +++ b/2019/5xxx/CVE-2019-5020.json @@ -58,5 +58,13 @@ "value": "An exploitable denial of service vulnerability exists in the object lookup functionality of Yara 3.8.1. A specially crafted binary file can cause a negative value to be read to satisfy an assert, resulting in Denial of Service. An attacker can create a malicious binary to trigger this vulnerability." } ] + }, + "impact": { + "cvss": { + "baseScore": 6.5, + "baseSeverity": "Medium", + "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H", + "version": "3.0" + } } } \ No newline at end of file diff --git a/2019/5xxx/CVE-2019-5021.json b/2019/5xxx/CVE-2019-5021.json index 6e76c57e637..dd0c229e71a 100644 --- a/2019/5xxx/CVE-2019-5021.json +++ b/2019/5xxx/CVE-2019-5021.json @@ -83,5 +83,13 @@ "value": "Versions of the Official Alpine Linux Docker images (since v3.3) contain a NULL password for the `root` user. This vulnerability appears to be the result of a regression introduced in December of 2015. Due to the nature of this issue, systems deployed using affected versions of the Alpine Linux container which utilize Linux PAM, or some other mechanism which uses the system shadow file as an authentication database, may accept a NULL password for the `root` user." } ] + }, + "impact": { + "cvss": { + "baseScore": 9.8, + "baseSeverity": "Critical", + "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "version": "3.0" + } } } \ No newline at end of file diff --git a/2019/5xxx/CVE-2019-5023.json b/2019/5xxx/CVE-2019-5023.json index bb03cb48507..5308e071a42 100644 --- a/2019/5xxx/CVE-2019-5023.json +++ b/2019/5xxx/CVE-2019-5023.json @@ -58,5 +58,13 @@ "value": "An exploitable vulnerability exists in the grsecurity PaX patch for the function read_kmem, in PaX from version pax-linux-4.9.8-test1 to 4.9.24-test7, grsecurity official from version grsecurity-3.1-4.9.8-201702060653 to grsecurity-3.1-4.9.24-201704252333, grsecurity unofficial from version v4.9.25-unofficialgrsec to v4.9.74-unofficialgrsec. PaX adds a temp buffer to the read_kmem function, which is never freed when an invalid address is supplied. This results in a memory leakage that can lead to a crash of the system. An attacker needs to induce a read to /dev/kmem using an invalid address to exploit this vulnerability." } ] + }, + "impact": { + "cvss": { + "baseScore": 5.9, + "baseSeverity": "Medium", + "vectorString": "CVSS:3.0/AV:L/AC:H/PR:N/UI:N/S:C/C:N/I:N/A:H", + "version": "3.0" + } } } \ No newline at end of file diff --git a/2019/5xxx/CVE-2019-5024.json b/2019/5xxx/CVE-2019-5024.json index 81d2a8bb8e9..9546c244e30 100644 --- a/2019/5xxx/CVE-2019-5024.json +++ b/2019/5xxx/CVE-2019-5024.json @@ -58,5 +58,13 @@ "value": "A restricted environment escape vulnerability exists in the \u201ckiosk mode\u201d function of Capsule Technologies SmartLinx Neuron 2 medical information collection devices running versions 9.0.3 or lower. A specific series of keyboard inputs can escape the restricted environment, resulting in full administrator access to the underlying operating system. An attacker can connect to the device via USB port with a keyboard or other HID device to trigger this vulnerability." } ] + }, + "impact": { + "cvss": { + "baseScore": 7.6, + "baseSeverity": "High", + "vectorString": "CVSS:3.0/AV:P/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H", + "version": "3.0" + } } } \ No newline at end of file diff --git a/2019/5xxx/CVE-2019-5029.json b/2019/5xxx/CVE-2019-5029.json index f607b54b527..acab6d420e8 100644 --- a/2019/5xxx/CVE-2019-5029.json +++ b/2019/5xxx/CVE-2019-5029.json @@ -58,5 +58,13 @@ "value": "An exploitable command injection vulnerability exists in the Config editor of the Exhibitor Web UI versions 1.0.9 to 1.7.1. Arbitrary shell commands surrounded by backticks or $() can be inserted into the editor and will be executed by the Exhibitor process when it launches ZooKeeper. An attacker can execute any command as the user running the Exhibitor process." } ] + }, + "impact": { + "cvss": { + "baseScore": 9.8, + "baseSeverity": "Critical", + "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "version": "3.0" + } } } \ No newline at end of file diff --git a/2019/5xxx/CVE-2019-5030.json b/2019/5xxx/CVE-2019-5030.json index 89486db4e85..4cecabcac2a 100644 --- a/2019/5xxx/CVE-2019-5030.json +++ b/2019/5xxx/CVE-2019-5030.json @@ -58,5 +58,13 @@ "value": "A buffer overflow vulnerability exists in the PowerPoint document conversion function of Rainbow PDF Office Server Document Converter V7.0 Pro MR1 (7,0,2019,0220). While parsing a document text info container, the TxMasterStyleAtom::parse function is incorrectly checking the bounds corresponding to the number of style levels, causing a vtable pointer to be overwritten, which leads to code execution." } ] + }, + "impact": { + "cvss": { + "baseScore": 8.8, + "baseSeverity": "High", + "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", + "version": "3.0" + } } } \ No newline at end of file diff --git a/2019/5xxx/CVE-2019-5031.json b/2019/5xxx/CVE-2019-5031.json index 00657117f90..f886633b6d2 100644 --- a/2019/5xxx/CVE-2019-5031.json +++ b/2019/5xxx/CVE-2019-5031.json @@ -58,5 +58,13 @@ "value": "An exploitable memory corruption vulnerability exists in the JavaScript engine of Foxit Software's Foxit PDF Reader, version 9.4.1.16828. A specially crafted PDF document can trigger an out-of-memory condition which isn't handled properly, resulting in arbitrary code execution. An attacker needs to trick the user to open the malicious file to trigger this vulnerability. If the browser plugin extension is enabled, visiting a malicious site can also trigger the vulnerability." } ] + }, + "impact": { + "cvss": { + "baseScore": 8.8, + "baseSeverity": "High", + "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", + "version": "3.0" + } } } \ No newline at end of file diff --git a/2019/5xxx/CVE-2019-5032.json b/2019/5xxx/CVE-2019-5032.json index 8b5ed6acc17..2e571f07257 100644 --- a/2019/5xxx/CVE-2019-5032.json +++ b/2019/5xxx/CVE-2019-5032.json @@ -58,5 +58,13 @@ "value": "An exploitable out-of-bounds read vulnerability exists in the LabelSst record parser of Aspose Aspose.Cells 19.1.0 library. A specially crafted XLS file can cause an out-of-bounds read, resulting in remote code execution. An attacker needs to provide a malformed file to the victim to trigger the vulnerability." } ] + }, + "impact": { + "cvss": { + "baseScore": 9.8, + "baseSeverity": "Critical", + "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "version": "3.0" + } } } \ No newline at end of file diff --git a/2019/5xxx/CVE-2019-5033.json b/2019/5xxx/CVE-2019-5033.json index 3822b3ac749..229bc7d0381 100644 --- a/2019/5xxx/CVE-2019-5033.json +++ b/2019/5xxx/CVE-2019-5033.json @@ -58,5 +58,13 @@ "value": "An exploitable out-of-bounds read vulnerability exists in the Number record parser of Aspose Aspose.Cells 19.1.0 library. A specially crafted XLS file can cause an out-of-bounds read, resulting in remote code execution. An attacker needs to provide a malformed file to the victim to trigger the vulnerability." } ] + }, + "impact": { + "cvss": { + "baseScore": 9.8, + "baseSeverity": "Critical", + "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "version": "3.0" + } } } \ No newline at end of file diff --git a/2019/5xxx/CVE-2019-5034.json b/2019/5xxx/CVE-2019-5034.json index c1ccf7c936e..5b61681d976 100644 --- a/2019/5xxx/CVE-2019-5034.json +++ b/2019/5xxx/CVE-2019-5034.json @@ -58,5 +58,13 @@ "value": "An exploitable information disclosure vulnerability exists in the Weave Legacy Pairing functionality of Nest Cam IQ Indoor version 4620002. A set of specially crafted weave packets can cause an out of bounds read, resulting in information disclosure. An attacker can send packets to trigger this vulnerability." } ] + }, + "impact": { + "cvss": { + "baseScore": 5.3, + "baseSeverity": "Medium", + "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N", + "version": "3.0" + } } } \ No newline at end of file diff --git a/2019/5xxx/CVE-2019-5035.json b/2019/5xxx/CVE-2019-5035.json index 0ec0b8b3fc0..4137db4dfc1 100644 --- a/2019/5xxx/CVE-2019-5035.json +++ b/2019/5xxx/CVE-2019-5035.json @@ -58,5 +58,13 @@ "value": "An exploitable information disclosure vulnerability exists in the Weave PASE pairing functionality of the Nest Cam IQ Indoor, version 4620002. A set of specially crafted weave packets can brute force a pairing code, resulting in greater Weave access and potentially full device control. An attacker can send specially crafted packets to trigger this vulnerability." } ] + }, + "impact": { + "cvss": { + "baseScore": 9.0, + "baseSeverity": "Critical", + "vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H", + "version": "3.0" + } } } \ No newline at end of file diff --git a/2019/5xxx/CVE-2019-5036.json b/2019/5xxx/CVE-2019-5036.json index f9b2ddea2e9..32089ffa7ae 100644 --- a/2019/5xxx/CVE-2019-5036.json +++ b/2019/5xxx/CVE-2019-5036.json @@ -58,5 +58,13 @@ "value": "An exploitable denial-of-service vulnerability exists in the Weave error reporting functionality of the Nest Cam IQ Indoor, version 4620002. A specially crafted weave packets can cause an arbitrary Weave Exchange Session to close, resulting in a denial of service. An attacker can send a specially crafted packet to trigger this vulnerability." } ] + }, + "impact": { + "cvss": { + "baseScore": 7.5, + "baseSeverity": "High", + "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", + "version": "3.0" + } } } \ No newline at end of file diff --git a/2019/5xxx/CVE-2019-5037.json b/2019/5xxx/CVE-2019-5037.json index 3b11c9225b8..cb9200484ef 100644 --- a/2019/5xxx/CVE-2019-5037.json +++ b/2019/5xxx/CVE-2019-5037.json @@ -58,5 +58,13 @@ "value": "An exploitable denial-of-service vulnerability exists in the Weave certificate loading functionality of Nest Cam IQ Indoor camera, version 4620002. A specially crafted weave packet can cause an integer overflow and an out-of-bounds read on unmapped memory to occur, resulting in a denial of service. An attacker can send a specially crafted packet to trigger." } ] + }, + "impact": { + "cvss": { + "baseScore": 7.5, + "baseSeverity": "High", + "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", + "version": "3.0" + } } } \ No newline at end of file diff --git a/2019/5xxx/CVE-2019-5038.json b/2019/5xxx/CVE-2019-5038.json index 4c1688b6e57..f22b2774408 100644 --- a/2019/5xxx/CVE-2019-5038.json +++ b/2019/5xxx/CVE-2019-5038.json @@ -58,5 +58,13 @@ "value": "An exploitable command execution vulnerability exists in the print-tlv command of Weave tool. A specially crafted weave TLV can trigger a stack-based buffer overflow, resulting in code execution. An attacker can trigger this vulnerability by convincing the user to open a specially crafted Weave command." } ] + }, + "impact": { + "cvss": { + "baseScore": 7.5, + "baseSeverity": "High", + "vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H", + "version": "3.0" + } } } \ No newline at end of file diff --git a/2019/5xxx/CVE-2019-5039.json b/2019/5xxx/CVE-2019-5039.json index 874e2175113..f675dd0e5d6 100644 --- a/2019/5xxx/CVE-2019-5039.json +++ b/2019/5xxx/CVE-2019-5039.json @@ -58,5 +58,13 @@ "value": "An exploitable command execution vulnerability exists in the ASN1 certificate writing functionality of Openweave-core version 4.0.2. A specially crafted weave certificate can trigger a heap-based buffer overflow, resulting in code execution. An attacker can craft a weave certificate to trigger this vulnerability." } ] + }, + "impact": { + "cvss": { + "baseScore": 7.5, + "baseSeverity": "High", + "vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H", + "version": "3.0" + } } } \ No newline at end of file diff --git a/2019/5xxx/CVE-2019-5040.json b/2019/5xxx/CVE-2019-5040.json index 952c8c1e26c..454578028bd 100644 --- a/2019/5xxx/CVE-2019-5040.json +++ b/2019/5xxx/CVE-2019-5040.json @@ -58,5 +58,13 @@ "value": "An exploitable information disclosure vulnerability exists in the Weave MessageLayer parsing of Openweave-core version 4.0.2 and Nest Cam IQ Indoor version 4620002. A specially crafted weave packet can cause an integer overflow to occur, resulting in PacketBuffer data reuse. An attacker can send a packet to trigger this vulnerability." } ] + }, + "impact": { + "cvss": { + "baseScore": 8.2, + "baseSeverity": "High", + "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:L", + "version": "3.0" + } } } \ No newline at end of file diff --git a/2019/5xxx/CVE-2019-5041.json b/2019/5xxx/CVE-2019-5041.json index 003e00be607..f9342fe75c6 100644 --- a/2019/5xxx/CVE-2019-5041.json +++ b/2019/5xxx/CVE-2019-5041.json @@ -58,5 +58,13 @@ "value": "An exploitable Stack Based Buffer Overflow vulnerability exists in the EnumMetaInfo function of Aspose Aspose.Words library, version 18.11.0.0. A specially crafted doc file can cause a stack-based buffer overflow, resulting in remote code execution. An attacker needs to provide a malformed file to the victim to trigger this vulnerability." } ] + }, + "impact": { + "cvss": { + "baseScore": 9.8, + "baseSeverity": "Critical", + "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "version": "3.0" + } } } \ No newline at end of file diff --git a/2019/5xxx/CVE-2019-5042.json b/2019/5xxx/CVE-2019-5042.json index 2e534508e8f..f74de097836 100644 --- a/2019/5xxx/CVE-2019-5042.json +++ b/2019/5xxx/CVE-2019-5042.json @@ -58,5 +58,13 @@ "value": "An exploitable Use-After-Free vulnerability exists in the way FunctionType 0 PDF elements are processed in Aspose.PDF 19.2 for C++. A specially crafted PDF can cause a dangling heap pointer, resulting in a use-after-free. An attacker can send a malicious PDF to trigger this vulnerability." } ] + }, + "impact": { + "cvss": { + "baseScore": 8.8, + "baseSeverity": "High", + "vectorString": "CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", + "version": "3.0" + } } } \ No newline at end of file diff --git a/2019/5xxx/CVE-2019-5043.json b/2019/5xxx/CVE-2019-5043.json index 6e8a7dc177c..09583799ec8 100644 --- a/2019/5xxx/CVE-2019-5043.json +++ b/2019/5xxx/CVE-2019-5043.json @@ -58,5 +58,13 @@ "value": "An exploitable denial-of-service vulnerability exists in the Weave daemon of the Nest Cam IQ Indoor, version 4620002. A set of TCP connections can cause unrestricted resource allocation, resulting in a denial of service. An attacker can connect multiple times to trigger this vulnerability." } ] + }, + "impact": { + "cvss": { + "baseScore": 5.3, + "baseSeverity": "Medium", + "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L", + "version": "3.0" + } } } \ No newline at end of file diff --git a/2019/5xxx/CVE-2019-5045.json b/2019/5xxx/CVE-2019-5045.json index 3d3dd3d4e5b..5a3b31655e9 100644 --- a/2019/5xxx/CVE-2019-5045.json +++ b/2019/5xxx/CVE-2019-5045.json @@ -58,5 +58,13 @@ "value": "A specifically crafted jpeg2000 file embedded in a PDF file can lead to a heap corruption when opening a PDF document in NitroPDF 12.12.1.522. With careful memory manipulation, this can lead to arbitrary code execution. In order to trigger this vulnerability, the victim would need to open the malicious file." } ] + }, + "impact": { + "cvss": { + "baseScore": 8.8, + "baseSeverity": "High", + "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", + "version": "3.0" + } } } \ No newline at end of file diff --git a/2019/5xxx/CVE-2019-5046.json b/2019/5xxx/CVE-2019-5046.json index 9697be6c38f..5bb0c350a98 100644 --- a/2019/5xxx/CVE-2019-5046.json +++ b/2019/5xxx/CVE-2019-5046.json @@ -58,5 +58,13 @@ "value": "A specifically crafted jpeg2000 file embedded in a PDF file can lead to a heap corruption when opening a PDF document in NitroPDF 12.12.1.522. With careful memory manipulation, this can lead to arbitrary code execution. In order to trigger this vulnerability, the victim would need to open the malicious file." } ] + }, + "impact": { + "cvss": { + "baseScore": 8.8, + "baseSeverity": "High", + "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", + "version": "3.0" + } } } \ No newline at end of file diff --git a/2019/5xxx/CVE-2019-5047.json b/2019/5xxx/CVE-2019-5047.json index d6720ea0777..91bd2d4100e 100644 --- a/2019/5xxx/CVE-2019-5047.json +++ b/2019/5xxx/CVE-2019-5047.json @@ -58,5 +58,13 @@ "value": "An exploitable Use After Free vulnerability exists in the CharProcs parsing functionality of NitroPDF. A specially crafted PDF can cause a type confusion, resulting in a Use After Free. An attacker can craft a malicious PDF to trigger this vulnerability." } ] + }, + "impact": { + "cvss": { + "baseScore": 7.5, + "baseSeverity": "High", + "vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H", + "version": "3.0" + } } } \ No newline at end of file diff --git a/2019/5xxx/CVE-2019-5048.json b/2019/5xxx/CVE-2019-5048.json index 63194543831..e395293ecfa 100644 --- a/2019/5xxx/CVE-2019-5048.json +++ b/2019/5xxx/CVE-2019-5048.json @@ -58,5 +58,13 @@ "value": "A specifically crafted PDF file can lead to a heap corruption when opened in NitroPDF 12.12.1.522. With careful memory manipulation, this can lead to arbitrary code execution. In order to trigger this vulnerability, the victim would need to open the malicious file." } ] + }, + "impact": { + "cvss": { + "baseScore": 8.8, + "baseSeverity": "High", + "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", + "version": "3.0" + } } } \ No newline at end of file diff --git a/2019/5xxx/CVE-2019-5050.json b/2019/5xxx/CVE-2019-5050.json index d615e95fe8b..d49eccb3219 100644 --- a/2019/5xxx/CVE-2019-5050.json +++ b/2019/5xxx/CVE-2019-5050.json @@ -58,5 +58,13 @@ "value": "A specifically crafted PDF file can lead to a heap corruption when opened in NitroPDF 12.12.1.522. With careful memory manipulation, this can lead to arbitrary code execution. In order to trigger this vulnerability, the victim would need to open the malicious file." } ] + }, + "impact": { + "cvss": { + "baseScore": 8.8, + "baseSeverity": "High", + "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", + "version": "3.0" + } } } \ No newline at end of file diff --git a/2019/5xxx/CVE-2019-5051.json b/2019/5xxx/CVE-2019-5051.json index 3e6652707bc..76ba2d9c0a4 100644 --- a/2019/5xxx/CVE-2019-5051.json +++ b/2019/5xxx/CVE-2019-5051.json @@ -78,5 +78,13 @@ "value": "An exploitable heap-based buffer overflow vulnerability exists when loading a PCX file in SDL2_image, version 2.0.4. A missing error handler can lead to a buffer overflow and potential code execution. An attacker can provide a specially crafted image file to trigger this vulnerability." } ] + }, + "impact": { + "cvss": { + "baseScore": 8.8, + "baseSeverity": "High", + "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", + "version": "3.0" + } } } \ No newline at end of file diff --git a/2019/5xxx/CVE-2019-5052.json b/2019/5xxx/CVE-2019-5052.json index 9a75fc79c61..22d6009da33 100644 --- a/2019/5xxx/CVE-2019-5052.json +++ b/2019/5xxx/CVE-2019-5052.json @@ -93,5 +93,13 @@ "value": "An exploitable integer overflow vulnerability exists when loading a PCX file in SDL2_image 2.0.4. A specially crafted file can cause an integer overflow, resulting in too little memory being allocated, which can lead to a buffer overflow and potential code execution. An attacker can provide a specially crafted image file to trigger this vulnerability." } ] + }, + "impact": { + "cvss": { + "baseScore": 8.8, + "baseSeverity": "High", + "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", + "version": "3.0" + } } } \ No newline at end of file diff --git a/2019/5xxx/CVE-2019-5053.json b/2019/5xxx/CVE-2019-5053.json index 0e0064e761d..bdab0e4507f 100644 --- a/2019/5xxx/CVE-2019-5053.json +++ b/2019/5xxx/CVE-2019-5053.json @@ -58,5 +58,13 @@ "value": "An exploitable use-after-free vulnerability exists in the Length parsing function of NitroPDF. A specially crafted PDF can cause a type confusion, resulting in a use-after-free condition. An attacker can craft a malicious PDF to trigger this vulnerability." } ] + }, + "impact": { + "cvss": { + "baseScore": 7.5, + "baseSeverity": "High", + "vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H", + "version": "3.0" + } } } \ No newline at end of file diff --git a/2019/5xxx/CVE-2019-5054.json b/2019/5xxx/CVE-2019-5054.json index b0fe85ef5f9..7d39d5eb76a 100644 --- a/2019/5xxx/CVE-2019-5054.json +++ b/2019/5xxx/CVE-2019-5054.json @@ -58,5 +58,13 @@ "value": "An exploitable denial-of-service vulnerability exists in the session handling functionality of the NETGEAR N300 (WNR2000v5 with Firmware Version V1.0.0.70) HTTP server. An HTTP request with an empty User-Agent string sent to a page requiring authentication can cause a null pointer dereference, resulting in the HTTP service crashing. An unauthenticated attacker can send a specially crafted HTTP request to trigger this vulnerability." } ] + }, + "impact": { + "cvss": { + "baseScore": 7.5, + "baseSeverity": "High", + "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", + "version": "3.0" + } } } \ No newline at end of file diff --git a/2019/5xxx/CVE-2019-5055.json b/2019/5xxx/CVE-2019-5055.json index 9eb9d7b7970..22f3b8ef2e9 100644 --- a/2019/5xxx/CVE-2019-5055.json +++ b/2019/5xxx/CVE-2019-5055.json @@ -58,5 +58,13 @@ "value": "An exploitable denial-of-service vulnerability exists in the Host Access Point Daemon (hostapd) on the NETGEAR N300 (WNR2000v5 with Firmware Version V1.0.0.70) wireless router. A SOAP request sent in an invalid sequence to the service can cause a null pointer dereference, resulting in the hostapd service crashing. An unauthenticated attacker can send a specially-crafted SOAP request to trigger this vulnerability." } ] + }, + "impact": { + "cvss": { + "baseScore": 7.5, + "baseSeverity": "High", + "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", + "version": "3.0" + } } } \ No newline at end of file diff --git a/2019/5xxx/CVE-2019-5057.json b/2019/5xxx/CVE-2019-5057.json index abd7d754897..f11c763d57f 100644 --- a/2019/5xxx/CVE-2019-5057.json +++ b/2019/5xxx/CVE-2019-5057.json @@ -78,5 +78,13 @@ "value": "An exploitable code execution vulnerability exists in the PCX image-rendering functionality of SDL2_image 2.0.4. A specially crafted PCX image can cause a heap overflow, resulting in code execution. An attacker can display a specially crafted image to trigger this vulnerability." } ] + }, + "impact": { + "cvss": { + "baseScore": 8.8, + "baseSeverity": "High", + "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", + "version": "3.0" + } } } \ No newline at end of file diff --git a/2019/5xxx/CVE-2019-5058.json b/2019/5xxx/CVE-2019-5058.json index f4ded8602fa..f946e35d9e6 100644 --- a/2019/5xxx/CVE-2019-5058.json +++ b/2019/5xxx/CVE-2019-5058.json @@ -78,5 +78,13 @@ "value": "An exploitable code execution vulnerability exists in the XCF image rendering functionality of SDL2_image 2.0.4. A specially crafted XCF image can cause a heap overflow, resulting in code execution. An attacker can display a specially crafted image to trigger this vulnerability." } ] + }, + "impact": { + "cvss": { + "baseScore": 8.8, + "baseSeverity": "High", + "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", + "version": "3.0" + } } } \ No newline at end of file diff --git a/2019/5xxx/CVE-2019-5059.json b/2019/5xxx/CVE-2019-5059.json index 1cc11b1d7c6..c264c4c439d 100644 --- a/2019/5xxx/CVE-2019-5059.json +++ b/2019/5xxx/CVE-2019-5059.json @@ -78,5 +78,13 @@ "value": "An exploitable code execution vulnerability exists in the XPM image rendering functionality of SDL2_image 2.0.4. A specially crafted XPM image can cause an integer overflow, allocating too small of a buffer. This buffer can then be written out of bounds resulting in a heap overflow, ultimately ending in code execution. An attacker can display a specially crafted image to trigger this vulnerability." } ] + }, + "impact": { + "cvss": { + "baseScore": 8.8, + "baseSeverity": "High", + "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", + "version": "3.0" + } } } \ No newline at end of file diff --git a/2019/5xxx/CVE-2019-5060.json b/2019/5xxx/CVE-2019-5060.json index 71fd0e05067..c1625f37df9 100644 --- a/2019/5xxx/CVE-2019-5060.json +++ b/2019/5xxx/CVE-2019-5060.json @@ -78,5 +78,13 @@ "value": "An exploitable code execution vulnerability exists in the XPM image rendering function of SDL2_image 2.0.4. A specially crafted XPM image can cause an integer overflow in the colorhash function, allocating too small of a buffer. This buffer can then be written out of bounds, resulting in a heap overflow, ultimately ending in code execution. An attacker can display a specially crafted image to trigger this vulnerability." } ] + }, + "impact": { + "cvss": { + "baseScore": 8.8, + "baseSeverity": "High", + "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", + "version": "3.0" + } } } \ No newline at end of file diff --git a/2019/5xxx/CVE-2019-5061.json b/2019/5xxx/CVE-2019-5061.json index 49ef9dbfe5b..b922034e005 100644 --- a/2019/5xxx/CVE-2019-5061.json +++ b/2019/5xxx/CVE-2019-5061.json @@ -58,5 +58,13 @@ "value": "An exploitable denial-of-service vulnerability exists in the hostapd 2.6, where an attacker could trigger AP to send IAPP location updates for stations, before the required authentication process has completed. This could lead to different denial of service scenarios, either by causing CAM table attacks, or by leading to traffic flapping if faking already existing clients in other nearby Aps of the same wireless infrastructure. An attacker can forge Authentication and Association Request packets to trigger this vulnerability." } ] + }, + "impact": { + "cvss": { + "baseScore": 7.4, + "baseSeverity": "High", + "vectorString": "CVSS:3.0/AV:A/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H", + "version": "3.0" + } } } \ No newline at end of file diff --git a/2019/5xxx/CVE-2019-5062.json b/2019/5xxx/CVE-2019-5062.json index 1911831cf52..0bf68dbd2df 100644 --- a/2019/5xxx/CVE-2019-5062.json +++ b/2019/5xxx/CVE-2019-5062.json @@ -58,5 +58,13 @@ "value": "An exploitable denial-of-service vulnerability exists in the 802.11w security state handling for hostapd 2.6 connected clients with valid 802.11w sessions. By simulating an incomplete new association, an attacker can trigger a deauthentication against stations using 802.11w, resulting in a denial of service." } ] + }, + "impact": { + "cvss": { + "baseScore": 7.4, + "baseSeverity": "High", + "vectorString": "CVSS:3.0/AV:A/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H", + "version": "3.0" + } } } \ No newline at end of file diff --git a/2019/5xxx/CVE-2019-5063.json b/2019/5xxx/CVE-2019-5063.json index 755e6106828..dad30a01b51 100644 --- a/2019/5xxx/CVE-2019-5063.json +++ b/2019/5xxx/CVE-2019-5063.json @@ -68,5 +68,13 @@ "value": "An exploitable heap buffer overflow vulnerability exists in the data structure persistence functionality of OpenCV 4.1.0. A specially crafted XML file can cause a buffer overflow, resulting in multiple heap corruptions and potential code execution. An attacker can provide a specially crafted file to trigger this vulnerability." } ] + }, + "impact": { + "cvss": { + "baseScore": 8.8, + "baseSeverity": "High", + "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", + "version": "3.0" + } } } \ No newline at end of file diff --git a/2019/5xxx/CVE-2019-5064.json b/2019/5xxx/CVE-2019-5064.json index bde6f2fa366..7ac461ddce5 100644 --- a/2019/5xxx/CVE-2019-5064.json +++ b/2019/5xxx/CVE-2019-5064.json @@ -73,5 +73,13 @@ "value": "An exploitable heap buffer overflow vulnerability exists in the data structure persistence functionality of OpenCV, before version 4.2.0. A specially crafted JSON file can cause a buffer overflow, resulting in multiple heap corruptions and potentially code execution. An attacker can provide a specially crafted file to trigger this vulnerability." } ] + }, + "impact": { + "cvss": { + "baseScore": 8.8, + "baseSeverity": "High", + "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", + "version": "3.0" + } } } \ No newline at end of file diff --git a/2019/5xxx/CVE-2019-5065.json b/2019/5xxx/CVE-2019-5065.json index 5a43827bf71..a7190e56a2a 100644 --- a/2019/5xxx/CVE-2019-5065.json +++ b/2019/5xxx/CVE-2019-5065.json @@ -58,5 +58,13 @@ "value": "An exploitable information disclosure vulnerability exists in the packet-parsing functionality of Blynk-Library v0.6.1. A specially crafted packet can cause an unterminated strncpy, resulting in information disclosure. An attacker can send a packet to trigger this vulnerability." } ] + }, + "impact": { + "cvss": { + "baseScore": 5.3, + "baseSeverity": "Medium", + "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N", + "version": "3.0" + } } } \ No newline at end of file diff --git a/2019/5xxx/CVE-2019-5066.json b/2019/5xxx/CVE-2019-5066.json index a092838d6af..43e53ac21cb 100644 --- a/2019/5xxx/CVE-2019-5066.json +++ b/2019/5xxx/CVE-2019-5066.json @@ -58,5 +58,13 @@ "value": "An exploitable use-after-free vulnerability exists in the way LZW-compressed streams are processed in Aspose.PDF 19.2 for C++. A specially crafted PDF can cause a dangling heap pointer, resulting in a use-after-free condition. To trigger this vulnerability, a specifically crafted PDF document needs to be processed by the target application." } ] + }, + "impact": { + "cvss": { + "baseScore": 9.8, + "baseSeverity": "Critical", + "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "version": "3.0" + } } } \ No newline at end of file diff --git a/2019/5xxx/CVE-2019-5067.json b/2019/5xxx/CVE-2019-5067.json index ee1f4e9f4cf..8805cb5b2d3 100644 --- a/2019/5xxx/CVE-2019-5067.json +++ b/2019/5xxx/CVE-2019-5067.json @@ -58,5 +58,13 @@ "value": "An uninitialized memory access vulnerability exists in the way Aspose.PDF 19.2 for C++ handles invalid parent object pointers. A specially crafted PDF can cause a read and write from uninitialized memory, resulting in memory corruption and possibly arbitrary code execution. To trigger this vulnerability, a specifically crafted PDF document needs to be processed by the target application." } ] + }, + "impact": { + "cvss": { + "baseScore": 9.8, + "baseSeverity": "Critical", + "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "version": "3.0" + } } } \ No newline at end of file diff --git a/2019/5xxx/CVE-2019-5068.json b/2019/5xxx/CVE-2019-5068.json index 3f28046738c..2c948061294 100644 --- a/2019/5xxx/CVE-2019-5068.json +++ b/2019/5xxx/CVE-2019-5068.json @@ -83,5 +83,13 @@ "value": "An exploitable shared memory permissions vulnerability exists in the functionality of X11 Mesa 3D Graphics Library 19.1.2. An attacker can access the shared memory without any specific permissions to trigger this vulnerability." } ] + }, + "impact": { + "cvss": { + "baseScore": 5.1, + "baseSeverity": "Medium", + "vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N", + "version": "3.0" + } } } \ No newline at end of file diff --git a/2019/5xxx/CVE-2019-5069.json b/2019/5xxx/CVE-2019-5069.json index c7bdc239934..5786252c96e 100644 --- a/2019/5xxx/CVE-2019-5069.json +++ b/2019/5xxx/CVE-2019-5069.json @@ -58,5 +58,13 @@ "value": "A code execution vulnerability exists in Epignosis eFront LMS v5.2.12. A specially crafted web request can cause unsafe deserialization potentially resulting in PHP code being executed. An attacker can send a crafted web parameter to trigger this vulnerability." } ] + }, + "impact": { + "cvss": { + "baseScore": 8.8, + "baseSeverity": "High", + "vectorString": "CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", + "version": "3.0" + } } } \ No newline at end of file diff --git a/2019/5xxx/CVE-2019-5070.json b/2019/5xxx/CVE-2019-5070.json index f1ac6886ed8..a0834d01985 100644 --- a/2019/5xxx/CVE-2019-5070.json +++ b/2019/5xxx/CVE-2019-5070.json @@ -58,5 +58,13 @@ "value": "An exploitable SQL injection vulnerability exists in the unauthenticated portion of eFront LMS, versions v5.2.12 and earlier. Specially crafted web request to login page can cause SQL injections, resulting in data compromise. An attacker can use a browser to trigger these vulnerabilities, and no special tools are required." } ] + }, + "impact": { + "cvss": { + "baseScore": 6.5, + "baseSeverity": "Medium", + "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N", + "version": "3.0" + } } } \ No newline at end of file diff --git a/2019/5xxx/CVE-2019-5071.json b/2019/5xxx/CVE-2019-5071.json index ae4375ced2d..e66906181c8 100644 --- a/2019/5xxx/CVE-2019-5071.json +++ b/2019/5xxx/CVE-2019-5071.json @@ -58,5 +58,13 @@ "value": "An exploitable command injection vulnerability exists in the /goform/WanParameterSetting functionality of Tenda AC9 Router AC1200 Smart Dual-Band Gigabit WiFi Route (AC9V1.0 Firmware V15.03.05.16multiTRU). A specially crafted HTTP POST request can cause a command injection in the DNS1 post parameters, resulting in code execution. An attacker can send HTTP POST request with command to trigger this vulnerability." } ] + }, + "impact": { + "cvss": { + "baseScore": 7.8, + "baseSeverity": "High", + "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", + "version": "3.0" + } } } \ No newline at end of file diff --git a/2019/5xxx/CVE-2019-5072.json b/2019/5xxx/CVE-2019-5072.json index b30fd9bd17f..ecc69ceb5c1 100644 --- a/2019/5xxx/CVE-2019-5072.json +++ b/2019/5xxx/CVE-2019-5072.json @@ -58,5 +58,13 @@ "value": "An exploitable command injection vulnerability exists in the /goform/WanParameterSetting functionality of Tenda AC9 Router AC1200 Smart Dual-Band Gigabit WiFi Route (AC9V1.0 Firmware V15.03.05.16multiTRU). A specially crafted HTTP POST request can cause a command injection in the DNS2 post parameters, resulting in code execution. An attacker can send HTTP POST request with command to trigger this vulnerability." } ] + }, + "impact": { + "cvss": { + "baseScore": 7.8, + "baseSeverity": "High", + "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", + "version": "3.0" + } } } \ No newline at end of file diff --git a/2019/5xxx/CVE-2019-5076.json b/2019/5xxx/CVE-2019-5076.json index 1dec5c8f32e..b703e340ad9 100644 --- a/2019/5xxx/CVE-2019-5076.json +++ b/2019/5xxx/CVE-2019-5076.json @@ -58,5 +58,13 @@ "value": "An exploitable out-of-bounds write vulnerability exists in the igcore19d.dll PNG header-parser of the Accusoft ImageGear 19.3.0 library. A specially crafted PNG file can cause an out-of-bounds write, resulting in a remote code execution. An attacker needs to provide a malformed file to the viction to trigger the vulnerability." } ] + }, + "impact": { + "cvss": { + "baseScore": 9.8, + "baseSeverity": "Critical", + "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "version": "3.0" + } } } \ No newline at end of file diff --git a/2019/5xxx/CVE-2019-5083.json b/2019/5xxx/CVE-2019-5083.json index 6a1720a4976..9d3f0c94c89 100644 --- a/2019/5xxx/CVE-2019-5083.json +++ b/2019/5xxx/CVE-2019-5083.json @@ -58,5 +58,13 @@ "value": "An exploitable out-of-bounds write vulnerability exists in the igcore19d.dll TIFdecodethunderscan function of Accusoft ImageGear 19.3.0 library. A specially crafted TIFF file can cause an out of bounds write, resulting in a remote code execution. An attacker needs to provide a malformed file to the victim to trigger the vulnerability." } ] + }, + "impact": { + "cvss": { + "baseScore": 9.8, + "baseSeverity": "Critical", + "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "version": "3.0" + } } } \ No newline at end of file diff --git a/2019/5xxx/CVE-2019-5084.json b/2019/5xxx/CVE-2019-5084.json index 9ab5ecb672d..eeb50ab41dd 100644 --- a/2019/5xxx/CVE-2019-5084.json +++ b/2019/5xxx/CVE-2019-5084.json @@ -58,5 +58,13 @@ "value": "An exploitable heap out-of-bounds write vulnerability exists in the TIF-parsing functionality of LEADTOOLS 20. A specially crafted TIF image can cause an offset beyond the bounds of a heap allocation to be written, potentially resulting in code execution. An attacker can specially craft a TIF image to trigger this vulnerability." } ] + }, + "impact": { + "cvss": { + "baseScore": 8.8, + "baseSeverity": "High", + "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", + "version": "3.0" + } } } \ No newline at end of file diff --git a/2019/5xxx/CVE-2019-5085.json b/2019/5xxx/CVE-2019-5085.json index b2836ab04fc..57b3788fbf3 100644 --- a/2019/5xxx/CVE-2019-5085.json +++ b/2019/5xxx/CVE-2019-5085.json @@ -58,5 +58,13 @@ "value": "An exploitable code execution vulnerability exists in the DICOM packet-parsing functionality of LEADTOOLS libltdic.so, version 20.0.2019.3.15. A specially crafted packet can cause an integer overflow, resulting in heap corruption. An attacker can send a packet to trigger this vulnerability." } ] + }, + "impact": { + "cvss": { + "baseScore": 9.8, + "baseSeverity": "Critical", + "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "version": "3.0" + } } } \ No newline at end of file diff --git a/2019/5xxx/CVE-2019-5086.json b/2019/5xxx/CVE-2019-5086.json index b5a36e54c03..5a3a491499e 100644 --- a/2019/5xxx/CVE-2019-5086.json +++ b/2019/5xxx/CVE-2019-5086.json @@ -73,5 +73,13 @@ "value": "An exploitable integer overflow vulnerability exists in the flattenIncrementally function in the xcf2png and xcf2pnm binaries of xcftools, version 1.0.7. An integer overflow can occur while walking through tiles that could be exploited to corrupt memory and execute arbitrary code. In order to trigger this vulnerability, a victim would need to open a specially crafted XCF file." } ] + }, + "impact": { + "cvss": { + "baseScore": 7.5, + "baseSeverity": "High", + "vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H", + "version": "3.0" + } } } \ No newline at end of file diff --git a/2019/5xxx/CVE-2019-5087.json b/2019/5xxx/CVE-2019-5087.json index 8c7f05a1830..63b17ac3d92 100644 --- a/2019/5xxx/CVE-2019-5087.json +++ b/2019/5xxx/CVE-2019-5087.json @@ -73,5 +73,13 @@ "value": "An exploitable integer overflow vulnerability exists in the flattenIncrementally function in the xcf2png and xcf2pnm binaries of xcftools 1.0.7. An integer overflow can occur while calculating the row's allocation size, that could be exploited to corrupt memory and eventually execute arbitrary code. In order to trigger this vulnerability, a victim would need to open a specially crafted XCF file." } ] + }, + "impact": { + "cvss": { + "baseScore": 8.8, + "baseSeverity": "High", + "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", + "version": "3.0" + } } } \ No newline at end of file diff --git a/2019/5xxx/CVE-2019-5088.json b/2019/5xxx/CVE-2019-5088.json index 38326c408b5..86e7d693e23 100644 --- a/2019/5xxx/CVE-2019-5088.json +++ b/2019/5xxx/CVE-2019-5088.json @@ -58,5 +58,13 @@ "value": "An exploitable memory corruption vulnerability exists in Investintech Able2Extract Professional 14.0.7 x64. A specially crafted BMP file can cause an out-of-bounds memory write, allowing a potential attacker to execute arbitrary code on the victim machine. Can trigger this vulnerability by sending the user a specially crafted BMP file." } ] + }, + "impact": { + "cvss": { + "baseScore": 8.8, + "baseSeverity": "High", + "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", + "version": "3.0" + } } } \ No newline at end of file diff --git a/2019/5xxx/CVE-2019-5089.json b/2019/5xxx/CVE-2019-5089.json index ca273249fe4..01be66c0e6c 100644 --- a/2019/5xxx/CVE-2019-5089.json +++ b/2019/5xxx/CVE-2019-5089.json @@ -58,5 +58,13 @@ "value": "An exploitable memory corruption vulnerability exists in Investintech Able2Extract Professional 4.0.7 x64. A specially crafted JPEG file can cause an out-of-bounds memory write, allowing an attacker to execute arbitrary code on the victim machine. An attacker could exploit a vulnerability by providing the user with a specially crafted JPEG file." } ] + }, + "impact": { + "cvss": { + "baseScore": 8.8, + "baseSeverity": "High", + "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", + "version": "3.0" + } } } \ No newline at end of file diff --git a/2019/5xxx/CVE-2019-5090.json b/2019/5xxx/CVE-2019-5090.json index a7bb353f3f8..90b15e8b159 100644 --- a/2019/5xxx/CVE-2019-5090.json +++ b/2019/5xxx/CVE-2019-5090.json @@ -58,5 +58,13 @@ "value": "An exploitable information disclosure vulnerability exists in the DICOM packet-parsing functionality of LEADTOOLS libltdic.so, version 20.0.2019.3.15. A specially crafted packet can cause an out-of-bounds read, resulting in information disclosure. An attacker can send a packet to trigger this vulnerability." } ] + }, + "impact": { + "cvss": { + "baseScore": 9.1, + "baseSeverity": "Critical", + "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H", + "version": "3.0" + } } } \ No newline at end of file diff --git a/2019/5xxx/CVE-2019-5091.json b/2019/5xxx/CVE-2019-5091.json index 5e35fb7f8f6..f7691f23de0 100644 --- a/2019/5xxx/CVE-2019-5091.json +++ b/2019/5xxx/CVE-2019-5091.json @@ -58,5 +58,13 @@ "value": "An exploitable denial-of-service vulnerability exists in the Dicom-packet parsing functionality of LEADTOOLS libltdic.so version 20.0.2019.3.15. A specially crafted packet can cause an infinite loop, resulting in a denial of service. An attacker can send a packet to trigger this vulnerability." } ] + }, + "impact": { + "cvss": { + "baseScore": 7.5, + "baseSeverity": "High", + "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", + "version": "3.0" + } } } \ No newline at end of file diff --git a/2019/5xxx/CVE-2019-5092.json b/2019/5xxx/CVE-2019-5092.json index 0dfbf4cba2d..012f5e47fd3 100644 --- a/2019/5xxx/CVE-2019-5092.json +++ b/2019/5xxx/CVE-2019-5092.json @@ -58,5 +58,13 @@ "value": "An exploitable heap out of bounds write vulnerability exists in the UI tag parsing functionality of the DICOM image format of LEADTOOLS 20.0.2019.3.15. A specially crafted DICOM image can cause an offset beyond the bounds of a heap allocation to be written, potentially resulting in code execution. An attacker can specially craft a DICOM image to trigger this vulnerability." } ] + }, + "impact": { + "cvss": { + "baseScore": 8.8, + "baseSeverity": "High", + "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", + "version": "3.0" + } } } \ No newline at end of file diff --git a/2019/5xxx/CVE-2019-5093.json b/2019/5xxx/CVE-2019-5093.json index d9ea0b90ba5..a34fd21ae70 100644 --- a/2019/5xxx/CVE-2019-5093.json +++ b/2019/5xxx/CVE-2019-5093.json @@ -58,5 +58,13 @@ "value": "An exploitable code execution vulnerability exists in the DICOM network response functionality of LEADTOOLS libltdic.so version 20.0.2019.3.15. A specially crafted packet can cause an integer overflow, resulting in heap corruption. An attacker can send a packet to trigger this vulnerability." } ] + }, + "impact": { + "cvss": { + "baseScore": 8.1, + "baseSeverity": "High", + "vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H", + "version": "3.0" + } } } \ No newline at end of file diff --git a/2019/5xxx/CVE-2019-5094.json b/2019/5xxx/CVE-2019-5094.json index 24a75ce3b67..26e8cfe4bf5 100644 --- a/2019/5xxx/CVE-2019-5094.json +++ b/2019/5xxx/CVE-2019-5094.json @@ -103,5 +103,13 @@ "value": "An exploitable code execution vulnerability exists in the quota file functionality of E2fsprogs 1.45.3. A specially crafted ext4 partition can cause an out-of-bounds write on the heap, resulting in code execution. An attacker can corrupt a partition to trigger this vulnerability." } ] + }, + "impact": { + "cvss": { + "baseScore": 7.5, + "baseSeverity": "High", + "vectorString": "CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:H", + "version": "3.1" + } } } \ No newline at end of file diff --git a/2019/5xxx/CVE-2019-5096.json b/2019/5xxx/CVE-2019-5096.json index 01689b883e1..a7fdd5b1432 100644 --- a/2019/5xxx/CVE-2019-5096.json +++ b/2019/5xxx/CVE-2019-5096.json @@ -58,5 +58,13 @@ "value": "An exploitable code execution vulnerability exists in the processing of multi-part/form-data requests within the base GoAhead web server application in versions v5.0.1, v.4.1.1 and v3.6.5. A specially crafted HTTP request can lead to a use-after-free condition during the processing of this request that can be used to corrupt heap structures that could lead to full code execution. The request can be unauthenticated in the form of GET or POST requests, and does not require the requested resource to exist on the server." } ] + }, + "impact": { + "cvss": { + "baseScore": 9.8, + "baseSeverity": "Critical", + "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "version": "3.0" + } } } \ No newline at end of file diff --git a/2019/5xxx/CVE-2019-5097.json b/2019/5xxx/CVE-2019-5097.json index 928e8fc9bc2..9de3793f052 100644 --- a/2019/5xxx/CVE-2019-5097.json +++ b/2019/5xxx/CVE-2019-5097.json @@ -58,5 +58,13 @@ "value": "A denial-of-service vulnerability exists in the processing of multi-part/form-data requests in the base GoAhead web server application in versions v5.0.1, v.4.1.1 and v3.6.5. A specially crafted HTTP request can lead to an infinite loop in the process. The request can be unauthenticated in the form of GET or POST requests and does not require the requested resource to exist on the server." } ] + }, + "impact": { + "cvss": { + "baseScore": 5.3, + "baseSeverity": "Medium", + "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L", + "version": "3.0" + } } } \ No newline at end of file diff --git a/2019/5xxx/CVE-2019-5099.json b/2019/5xxx/CVE-2019-5099.json index 5a9fecf91ef..98c1a08ac6e 100644 --- a/2019/5xxx/CVE-2019-5099.json +++ b/2019/5xxx/CVE-2019-5099.json @@ -58,5 +58,13 @@ "value": "An exploitable integer underflow vulnerability exists in the CMP-parsing functionality of LEADTOOLS 20. A specially crafted CMP image file can cause an integer underflow, potentially resulting in code execution. An attacker can specially craft a CMP image to trigger this vulnerability." } ] + }, + "impact": { + "cvss": { + "baseScore": 8.8, + "baseSeverity": "High", + "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", + "version": "3.0" + } } } \ No newline at end of file diff --git a/2019/5xxx/CVE-2019-5100.json b/2019/5xxx/CVE-2019-5100.json index 9d96f9fbd4c..70dcae898fe 100644 --- a/2019/5xxx/CVE-2019-5100.json +++ b/2019/5xxx/CVE-2019-5100.json @@ -58,5 +58,13 @@ "value": "An exploitable integer overflow vulnerability exists in the BMP header parsing functionality of LEADTOOLS 20. A specially crafted BMP image file can cause an integer overflow, potentially resulting in code execution. An attacker can specially craft a BMP image to trigger this vulnerability." } ] + }, + "impact": { + "cvss": { + "baseScore": 8.8, + "baseSeverity": "High", + "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", + "version": "3.0" + } } } \ No newline at end of file diff --git a/2019/5xxx/CVE-2019-5101.json b/2019/5xxx/CVE-2019-5101.json index 39494c4e77f..09231b040ff 100644 --- a/2019/5xxx/CVE-2019-5101.json +++ b/2019/5xxx/CVE-2019-5101.json @@ -58,5 +58,13 @@ "value": "An exploitable information leak vulnerability exists in the ustream-ssl library of OpenWrt, versions 18.06.4 and 15.05.1. When connecting to a remote server, the server's SSL certificate is checked but no action is taken when the certificate is invalid. An attacker could exploit this behavior by performing a man-in-the-middle attack, providing any certificate, leading to the theft of all the data sent by the client during the first request. After an SSL connection is initialized via _ustream_ssl_init, and after any data (e.g. the client's HTTP request) is written to the stream using ustream_printf, the code eventually enters the function __ustream_ssl_poll, which is used to dispatch the read/write events" } ] + }, + "impact": { + "cvss": { + "baseScore": 4.0, + "baseSeverity": "Medium", + "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:L/I:N/A:N", + "version": "3.1" + } } } \ No newline at end of file diff --git a/2019/5xxx/CVE-2019-5102.json b/2019/5xxx/CVE-2019-5102.json index 16ba4ab2ce5..ffb95301c10 100644 --- a/2019/5xxx/CVE-2019-5102.json +++ b/2019/5xxx/CVE-2019-5102.json @@ -58,5 +58,13 @@ "value": "An exploitable information leak vulnerability exists in the ustream-ssl library of OpenWrt, versions 18.06.4 and 15.05.1. When connecting to a remote server, the server's SSL certificate is checked but no action is taken when the certificate is invalid. An attacker could exploit this behavior by performing a man-in-the-middle attack, providing any certificate, leading to the theft of all the data sent by the client during the first request." } ] + }, + "impact": { + "cvss": { + "baseScore": 4.0, + "baseSeverity": "Medium", + "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:L/I:N/A:N", + "version": "3.1" + } } } \ No newline at end of file diff --git a/2019/5xxx/CVE-2019-5105.json b/2019/5xxx/CVE-2019-5105.json index 7bfc3566e2e..df025c53af9 100644 --- a/2019/5xxx/CVE-2019-5105.json +++ b/2019/5xxx/CVE-2019-5105.json @@ -63,5 +63,13 @@ "value": "An exploitable memory corruption vulnerability exists in the Name Service Client functionality of 3S-Smart Software Solutions CODESYS GatewayService. A specially crafted packet can cause a large memcpy, resulting in an access violation and termination of the process. An attacker can send a packet to a device running the GatewayService.exe to trigger this vulnerability. All variants of the CODESYS V3 products in all versions prior V3.5.16.10 containing the CmpRouter or CmpRouterEmbedded component are affected, regardless of the CPU type or operating system: CODESYS Control for BeagleBone, CODESYS Control for emPC-A/iMX6, CODESYS Control for IOT2000, CODESYS Control for Linux, CODESYS Control for PLCnext, CODESYS Control for PFC100, CODESYS Control for PFC200, CODESYS Control for Raspberry Pi, CODESYS Control RTE V3, CODESYS Control RTE V3 (for Beckhoff CX), CODESYS Control Win V3 (also part of the CODESYS Development System setup), CODESYS Control V3 Runtime System Toolkit, CODESYS V3 Embedded Target Visu Toolkit, CODESYS V3 Remote Target Visu Toolkit, CODESYS V3 Safety SIL2, CODESYS Edge Gateway V3, CODESYS Gateway V3, CODESYS HMI V3, CODESYS OPC Server V3, CODESYS PLCHandler SDK, CODESYS V3 Simulation Runtime (part of the CODESYS Development System)." } ] + }, + "impact": { + "cvss": { + "baseScore": 7.5, + "baseSeverity": "High", + "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", + "version": "3.0" + } } } \ No newline at end of file diff --git a/2019/5xxx/CVE-2019-5108.json b/2019/5xxx/CVE-2019-5108.json index 5c802d7d418..67dbede4e6b 100644 --- a/2019/5xxx/CVE-2019-5108.json +++ b/2019/5xxx/CVE-2019-5108.json @@ -123,5 +123,13 @@ "value": "An exploitable denial-of-service vulnerability exists in the Linux kernel prior to mainline 5.3. An attacker could exploit this vulnerability by triggering AP to send IAPP location updates for stations before the required authentication process has completed. This could lead to different denial-of-service scenarios, either by causing CAM table attacks, or by leading to traffic flapping if faking already existing clients in other nearby APs of the same wireless infrastructure. An attacker can forge Authentication and Association Request packets to trigger this vulnerability." } ] + }, + "impact": { + "cvss": { + "baseScore": 7.4, + "baseSeverity": "High", + "vectorString": "CVSS:3.0/AV:A/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H", + "version": "3.0" + } } } \ No newline at end of file diff --git a/2019/5xxx/CVE-2019-5109.json b/2019/5xxx/CVE-2019-5109.json index 09099452555..456a785445a 100644 --- a/2019/5xxx/CVE-2019-5109.json +++ b/2019/5xxx/CVE-2019-5109.json @@ -58,5 +58,13 @@ "value": "Exploitable SQL injection vulnerabilities exists in the authenticated portion of Forma LMS 2.2.1. Specially crafted web requests can cause SQL injections. An attacker can send a web request with parameters containing SQL injection attacks to trigger this vulnerability, potentially allowing exfiltration of the database, user credentials and, in certain configurations, access the underlying operating system." } ] + }, + "impact": { + "cvss": { + "baseScore": 7.4, + "baseSeverity": "High", + "vectorString": "CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:L", + "version": "3.0" + } } } \ No newline at end of file diff --git a/2019/5xxx/CVE-2019-5110.json b/2019/5xxx/CVE-2019-5110.json index 9846ccb83cb..dd59551aa44 100644 --- a/2019/5xxx/CVE-2019-5110.json +++ b/2019/5xxx/CVE-2019-5110.json @@ -58,5 +58,13 @@ "value": "Exploitable SQL injection vulnerabilities exist in the authenticated portion of Forma LMS 2.2.1. Specially crafted web requests can cause SQL injections. An attacker can send a web request with parameters containing SQL injection attacks to trigger this vulnerability, potentially allowing exfiltration of the database, user credentials and, in certain configurations, access the underlying operating system." } ] + }, + "impact": { + "cvss": { + "baseScore": 7.4, + "baseSeverity": "High", + "vectorString": "CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:L", + "version": "3.0" + } } } \ No newline at end of file diff --git a/2019/5xxx/CVE-2019-5111.json b/2019/5xxx/CVE-2019-5111.json index d0b80a6aee8..d2a81d6114c 100644 --- a/2019/5xxx/CVE-2019-5111.json +++ b/2019/5xxx/CVE-2019-5111.json @@ -58,5 +58,13 @@ "value": "Exploitable SQL injection vulnerability exists in the authenticated portion of Forma LMS 2.2.1. The /appLms/ajax.server.php URL and parameter filter_cat was confirmed to suffer from SQL injections and could be exploited by authenticated attackers. An attacker can send a web request with parameters containing SQL injection attacks to trigger this vulnerability, potentially allowing exfiltration of the database, user credentials and, in certain configurations, access the underlying operating system." } ] + }, + "impact": { + "cvss": { + "baseScore": 7.4, + "baseSeverity": "High", + "vectorString": "CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:L", + "version": "3.0" + } } } \ No newline at end of file diff --git a/2019/5xxx/CVE-2019-5112.json b/2019/5xxx/CVE-2019-5112.json index 76f953ecebd..ab7e7278ac8 100644 --- a/2019/5xxx/CVE-2019-5112.json +++ b/2019/5xxx/CVE-2019-5112.json @@ -58,5 +58,13 @@ "value": "Exploitable SQL injection vulnerability exists in the authenticated portion of Forma LMS 2.2.1. The /appLms/ajax.server.php URL and parameter filter_status was confirmed to suffer from SQL injections and could be exploited by authenticated attackers. An attacker can send a web request with parameters containing SQL injection attacks to trigger this vulnerability, potentially allowing exfiltration of the database, user credentials and, in certain configurations, access the underlying operating system." } ] + }, + "impact": { + "cvss": { + "baseScore": 7.4, + "baseSeverity": "High", + "vectorString": "CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:L", + "version": "3.0" + } } } \ No newline at end of file diff --git a/2019/5xxx/CVE-2019-5114.json b/2019/5xxx/CVE-2019-5114.json index 3fe7f032179..985a656a670 100644 --- a/2019/5xxx/CVE-2019-5114.json +++ b/2019/5xxx/CVE-2019-5114.json @@ -58,5 +58,13 @@ "value": "An exploitable SQL injection vulnerability exists in the authenticated portion of YouPHPTube 7.6. Specially crafted web requests can cause SQL injections. An attacker can send a web request with parameters containing SQL injection attacks to trigger this vulnerability, potentially allowing exfiltration of the database, user credentials and,in certain configuration, access the underlying operating system." } ] + }, + "impact": { + "cvss": { + "baseScore": 7.4, + "baseSeverity": "High", + "vectorString": "CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:L", + "version": "3.0" + } } } \ No newline at end of file diff --git a/2019/5xxx/CVE-2019-5116.json b/2019/5xxx/CVE-2019-5116.json index cdaec3cfa33..9bb51285ea0 100644 --- a/2019/5xxx/CVE-2019-5116.json +++ b/2019/5xxx/CVE-2019-5116.json @@ -58,5 +58,13 @@ "value": "An exploitable SQL injection vulnerability exists in the authenticated part of YouPHPTube 7.6. Specially crafted web requests can cause a SQL injection. An attacker can send a web request with parameters containing SQL injection attacks to trigger this vulnerability, potentially allowing exfiltration of the database, user credentials and in certain configuration, access the underlying operating system." } ] + }, + "impact": { + "cvss": { + "baseScore": 7.4, + "baseSeverity": "High", + "vectorString": "CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:L", + "version": "3.0" + } } } \ No newline at end of file diff --git a/2019/5xxx/CVE-2019-5117.json b/2019/5xxx/CVE-2019-5117.json index 6b509d8e93f..a44a93f041b 100644 --- a/2019/5xxx/CVE-2019-5117.json +++ b/2019/5xxx/CVE-2019-5117.json @@ -58,5 +58,13 @@ "value": "Exploitable SQL injection vulnerabilities exists in the authenticated portion of YouPHPTube 7.6. Specially crafted web requests can cause SQL injections. An attacker can send a web request with parameters containing SQL injection attacks to trigger this vulnerability, potentially allowing exfiltration of the database, user credentials and in certain configuration, access the underlying operating system." } ] + }, + "impact": { + "cvss": { + "baseScore": 7.4, + "baseSeverity": "High", + "vectorString": "CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:L", + "version": "3.0" + } } } \ No newline at end of file diff --git a/2019/5xxx/CVE-2019-5119.json b/2019/5xxx/CVE-2019-5119.json index 33667647841..7b257ad2fa9 100644 --- a/2019/5xxx/CVE-2019-5119.json +++ b/2019/5xxx/CVE-2019-5119.json @@ -58,5 +58,13 @@ "value": "An exploitable SQL injection vulnerability exist in the authenticated part of YouPHPTube 7.6. Specially crafted web requests can cause SQL injections. An attacker can send a web request with parameters containing SQL injection attacks to trigger this vulnerability, potentially allowing exfiltration of the database, user credentials and in certain configurations, access the underlying operating system." } ] + }, + "impact": { + "cvss": { + "baseScore": 7.4, + "baseSeverity": "High", + "vectorString": "CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:L", + "version": "3.0" + } } } \ No newline at end of file diff --git a/2019/5xxx/CVE-2019-5120.json b/2019/5xxx/CVE-2019-5120.json index bc5b33950c2..20a57cdd5b8 100644 --- a/2019/5xxx/CVE-2019-5120.json +++ b/2019/5xxx/CVE-2019-5120.json @@ -58,5 +58,13 @@ "value": "An exploitable SQL injection vulnerability exists in the authenticated part of YouPHPTube 7.6. Specially crafted web requests can cause SQL injections. An attacker can send a web request with parameters containing SQL injection attacks to trigger this vulnerability, potentially allowing exfiltration of the database, user credentials and in certain configurations, access the underlying operating system." } ] + }, + "impact": { + "cvss": { + "baseScore": 7.4, + "baseSeverity": "High", + "vectorString": "CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:L", + "version": "3.0" + } } } \ No newline at end of file diff --git a/2019/5xxx/CVE-2019-5121.json b/2019/5xxx/CVE-2019-5121.json index 0d1fde1dedc..f768f128aea 100644 --- a/2019/5xxx/CVE-2019-5121.json +++ b/2019/5xxx/CVE-2019-5121.json @@ -58,5 +58,13 @@ "value": "SQL injection vulnerabilities exists in the authenticated part of YouPHPTube 7.6. Specially crafted web requests can cause SQL injections. An attacker can send a web request with Parameter uuid in /objects/pluginSwitch.json.php" } ] + }, + "impact": { + "cvss": { + "baseScore": 7.4, + "baseSeverity": "High", + "vectorString": "CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:L", + "version": "3.0" + } } } \ No newline at end of file diff --git a/2019/5xxx/CVE-2019-5122.json b/2019/5xxx/CVE-2019-5122.json index e71c38a941d..c08262e2f19 100644 --- a/2019/5xxx/CVE-2019-5122.json +++ b/2019/5xxx/CVE-2019-5122.json @@ -58,5 +58,13 @@ "value": "SQL injection vulnerabilities exists in the authenticated part of YouPHPTube 7.6. Specially crafted web requests can cause SQL injections. An attacker can send a web request with Parameter name in /objects/pluginSwitch.json.php." } ] + }, + "impact": { + "cvss": { + "baseScore": 7.4, + "baseSeverity": "High", + "vectorString": "CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:L", + "version": "3.0" + } } } \ No newline at end of file diff --git a/2019/5xxx/CVE-2019-5123.json b/2019/5xxx/CVE-2019-5123.json index bb69a9d9066..5165a2509a5 100644 --- a/2019/5xxx/CVE-2019-5123.json +++ b/2019/5xxx/CVE-2019-5123.json @@ -58,5 +58,13 @@ "value": "Specially crafted web requests can cause SQL injections in YouPHPTube 7.6. An attacker can send a web request with Parameter dir in /objects/pluginSwitch.json.php." } ] + }, + "impact": { + "cvss": { + "baseScore": 7.4, + "baseSeverity": "High", + "vectorString": "CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:L", + "version": "3.0" + } } } \ No newline at end of file diff --git a/2019/5xxx/CVE-2019-5125.json b/2019/5xxx/CVE-2019-5125.json index 7f561f68c8a..23c98d2688b 100644 --- a/2019/5xxx/CVE-2019-5125.json +++ b/2019/5xxx/CVE-2019-5125.json @@ -58,5 +58,13 @@ "value": "An exploitable heap overflow vulnerability exists in the JPEG2000 parsing functionality of LEADTOOLS 20. A specially crafted J2K image file can cause an out of bounds write of a heap buffer, potentially resulting in code execution. An attack can specially craft a J2K image to trigger this vulnerability." } ] + }, + "impact": { + "cvss": { + "baseScore": 8.8, + "baseSeverity": "High", + "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", + "version": "3.0" + } } } \ No newline at end of file diff --git a/2019/5xxx/CVE-2019-5126.json b/2019/5xxx/CVE-2019-5126.json index 74e5cb0aeb4..bb342508de3 100644 --- a/2019/5xxx/CVE-2019-5126.json +++ b/2019/5xxx/CVE-2019-5126.json @@ -58,5 +58,13 @@ "value": "An exploitable use-after-free vulnerability exists in the JavaScript engine of Foxit PDF Reader, version 9.7.0.29435. A specially crafted PDF document can trigger a previously freed object in memory to be reused, resulting in arbitrary code execution. An attacker needs to trick the user to open the malicious file to trigger this vulnerability. If the browser plugin extension is enabled, visiting a malicious site can also trigger the vulnerability." } ] + }, + "impact": { + "cvss": { + "baseScore": 8.8, + "baseSeverity": "High", + "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", + "version": "3.0" + } } } \ No newline at end of file diff --git a/2019/5xxx/CVE-2019-5127.json b/2019/5xxx/CVE-2019-5127.json index dfc1798003a..7afc6e78ab5 100644 --- a/2019/5xxx/CVE-2019-5127.json +++ b/2019/5xxx/CVE-2019-5127.json @@ -58,5 +58,13 @@ "value": "A command injection have been found in YouPHPTube Encoder. A successful attack could allow an attacker to compromise the server. Exploitable unauthenticated command injections exist in YouPHPTube Encoder 2.3 a plugin for providing encoder functionality in YouPHPTube. The parameter base64Url in /objects/getImage.php is vulnerable to a command injection attack." } ] + }, + "impact": { + "cvss": { + "baseScore": 10.0, + "baseSeverity": null, + "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H", + "version": "3.0" + } } } \ No newline at end of file diff --git a/2019/5xxx/CVE-2019-5128.json b/2019/5xxx/CVE-2019-5128.json index 1b2464ff875..070526e20aa 100644 --- a/2019/5xxx/CVE-2019-5128.json +++ b/2019/5xxx/CVE-2019-5128.json @@ -58,5 +58,13 @@ "value": "A command injection have been found in YouPHPTube Encoder. A successful attack could allow an attacker to compromise the server. Exploitable unauthenticated command injections exist in YouPHPTube Encoder 2.3 a plugin for providing encoder functionality in YouPHPTube. The parameter base64Url in /objects/getImageMP4.php is vulnerable to a command injection attack." } ] + }, + "impact": { + "cvss": { + "baseScore": 10.0, + "baseSeverity": null, + "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H", + "version": "3.0" + } } } \ No newline at end of file diff --git a/2019/5xxx/CVE-2019-5129.json b/2019/5xxx/CVE-2019-5129.json index f0cba6530c5..7c8e4b6d9da 100644 --- a/2019/5xxx/CVE-2019-5129.json +++ b/2019/5xxx/CVE-2019-5129.json @@ -58,5 +58,13 @@ "value": "A command injection have been found in YouPHPTube Encoder. A successful attack could allow an attacker to compromise the server. Exploitable unauthenticated command injections exist in YouPHPTube Encoder 2.3 a plugin for providing encoder functionality in YouPHPTube. The parameter base64Url in /objects/getSpiritsFromVideo.php is vulnerable to a command injection attack." } ] + }, + "impact": { + "cvss": { + "baseScore": 10.0, + "baseSeverity": null, + "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H", + "version": "3.0" + } } } \ No newline at end of file diff --git a/2019/5xxx/CVE-2019-5130.json b/2019/5xxx/CVE-2019-5130.json index 9485cecfc67..b1a38282ba4 100644 --- a/2019/5xxx/CVE-2019-5130.json +++ b/2019/5xxx/CVE-2019-5130.json @@ -58,5 +58,13 @@ "value": "An exploitable use-after-free vulnerability exists in the JavaScript engine of Foxit Software's Foxit PDF Reader version 9.7.0.29435. A specially crafted PDF document can trigger a previously freed object in memory to be reused, resulting in arbitrary code execution. An attacker needs to trick the user to open the malicious file to trigger this vulnerability. If the browser plugin extension is enabled, visiting a malicious site can also trigger the vulnerability." } ] + }, + "impact": { + "cvss": { + "baseScore": 8.0, + "baseSeverity": "High", + "vectorString": "CVSS:3.0/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H", + "version": "3.0" + } } } \ No newline at end of file diff --git a/2019/5xxx/CVE-2019-5131.json b/2019/5xxx/CVE-2019-5131.json index f39d2b6fc3d..0954bdf0d3a 100644 --- a/2019/5xxx/CVE-2019-5131.json +++ b/2019/5xxx/CVE-2019-5131.json @@ -58,5 +58,13 @@ "value": "An exploitable use-after-free vulnerability exists in the JavaScript engine of Foxit Software's Foxit PDF Reader, version 9.7.0.29435. A specially crafted PDF document can trigger a previously freed object in memory to be reused, resulting in arbitrary code execution. An attacker needs to trick the user to open the malicious file to trigger this vulnerability. If the browser plugin extension is enabled, visiting a malicious site can also trigger the vulnerability." } ] + }, + "impact": { + "cvss": { + "baseScore": 8.8, + "baseSeverity": "High", + "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", + "version": "3.0" + } } } \ No newline at end of file diff --git a/2019/5xxx/CVE-2019-5132.json b/2019/5xxx/CVE-2019-5132.json index f959f0c0bb6..8b2496e3d3a 100644 --- a/2019/5xxx/CVE-2019-5132.json +++ b/2019/5xxx/CVE-2019-5132.json @@ -58,5 +58,13 @@ "value": "An exploitable out-of-bounds write vulnerability exists in the igcore19d.dll GEM Raster parser of the Accusoft ImageGear 19.3.0 library. A specially crafted GEM file can cause an out-of-bounds write, resulting in a remote code execution. An attacker needs to provide a malformed file to the victim to trigger the vulnerability." } ] + }, + "impact": { + "cvss": { + "baseScore": 9.8, + "baseSeverity": "Critical", + "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "version": "3.0" + } } } \ No newline at end of file diff --git a/2019/5xxx/CVE-2019-5133.json b/2019/5xxx/CVE-2019-5133.json index ce631e04eeb..eb4bdc201de 100644 --- a/2019/5xxx/CVE-2019-5133.json +++ b/2019/5xxx/CVE-2019-5133.json @@ -58,5 +58,13 @@ "value": "An exploitable out-of-bounds write vulnerability exists in the igcore19d.dll BMP parser of the ImageGear 19.3.0 library. A specially crafted BMP file can cause an out-of-bounds write, resulting in a remote code execution. An attacker needs to provide a malformed file to the victim to trigger the vulnerability." } ] + }, + "impact": { + "cvss": { + "baseScore": 9.8, + "baseSeverity": "Critical", + "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "version": "3.0" + } } } \ No newline at end of file diff --git a/2019/5xxx/CVE-2019-5136.json b/2019/5xxx/CVE-2019-5136.json index a0b997022ba..40fabcda13e 100644 --- a/2019/5xxx/CVE-2019-5136.json +++ b/2019/5xxx/CVE-2019-5136.json @@ -58,5 +58,13 @@ "value": "An exploitable privilege escalation vulnerability exists in the iw_console functionality of the Moxa AWK-3131A firmware version 1.13. A specially crafted menu selection string can cause an escape from the restricted console, resulting in system access as the root user. An attacker can send commands while authenticated as a low privilege user to trigger this vulnerability." } ] + }, + "impact": { + "cvss": { + "baseScore": 8.8, + "baseSeverity": "High", + "vectorString": "CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", + "version": "3.0" + } } } \ No newline at end of file diff --git a/2019/5xxx/CVE-2019-5137.json b/2019/5xxx/CVE-2019-5137.json index 36d01641ac0..1d5425a0f41 100644 --- a/2019/5xxx/CVE-2019-5137.json +++ b/2019/5xxx/CVE-2019-5137.json @@ -58,5 +58,13 @@ "value": "The usage of hard-coded cryptographic keys within the ServiceAgent binary allows for the decryption of captured traffic across the network from or to the Moxa AWK-3131A firmware version 1.13." } ] + }, + "impact": { + "cvss": { + "baseScore": 7.5, + "baseSeverity": "High", + "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", + "version": "3.0" + } } } \ No newline at end of file diff --git a/2019/5xxx/CVE-2019-5138.json b/2019/5xxx/CVE-2019-5138.json index a842eaca112..3a86470462f 100644 --- a/2019/5xxx/CVE-2019-5138.json +++ b/2019/5xxx/CVE-2019-5138.json @@ -58,5 +58,13 @@ "value": "An exploitable command injection vulnerability exists in encrypted diagnostic script functionality of the Moxa AWK-3131A firmware version 1.13. A specially crafted diagnostic script file can cause arbitrary busybox commands to be executed, resulting in remote control over the device. An attacker can send diagnostic while authenticated as a low privilege user to trigger this vulnerability." } ] + }, + "impact": { + "cvss": { + "baseScore": 9.9, + "baseSeverity": "Critical", + "vectorString": "CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H", + "version": "3.0" + } } } \ No newline at end of file diff --git a/2019/5xxx/CVE-2019-5139.json b/2019/5xxx/CVE-2019-5139.json index c32550057d4..4b28c3ce6e5 100644 --- a/2019/5xxx/CVE-2019-5139.json +++ b/2019/5xxx/CVE-2019-5139.json @@ -58,5 +58,13 @@ "value": "An exploitable use of hard-coded credentials vulnerability exists in multiple iw_* utilities of the Moxa AWK-3131A firmware version 1.13. The device operating system contains an undocumented encryption password, allowing for the creation of custom diagnostic scripts." } ] + }, + "impact": { + "cvss": { + "baseScore": 6.2, + "baseSeverity": "Medium", + "vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", + "version": "3.0" + } } } \ No newline at end of file diff --git a/2019/5xxx/CVE-2019-5140.json b/2019/5xxx/CVE-2019-5140.json index a373bd3e784..23c89d16a19 100644 --- a/2019/5xxx/CVE-2019-5140.json +++ b/2019/5xxx/CVE-2019-5140.json @@ -58,5 +58,13 @@ "value": "An exploitable command injection vulnerability exists in the iwwebs functionality of the Moxa AWK-3131A firmware version 1.13. A specially crafted diagnostic script file name can cause user input to be reflected in a subsequent iwsystem call, resulting in remote control over the device. An attacker can send commands while authenticated as a low privilege user to trigger this vulnerability." } ] + }, + "impact": { + "cvss": { + "baseScore": 8.8, + "baseSeverity": "High", + "vectorString": "CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", + "version": "3.0" + } } } \ No newline at end of file diff --git a/2019/5xxx/CVE-2019-5141.json b/2019/5xxx/CVE-2019-5141.json index ec72c6230ad..63e01a61f13 100644 --- a/2019/5xxx/CVE-2019-5141.json +++ b/2019/5xxx/CVE-2019-5141.json @@ -58,5 +58,13 @@ "value": "An exploitable command injection vulnerability exists in the iw_webs functionality of the Moxa AWK-3131A firmware version 1.13. A specially crafted iw_serverip parameter can cause user input to be reflected in a subsequent iw_system call, resulting in remote control over the device. An attacker can send commands while authenticated as a low privilege user to trigger this vulnerability." } ] + }, + "impact": { + "cvss": { + "baseScore": 8.8, + "baseSeverity": "High", + "vectorString": "CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", + "version": "3.0" + } } } \ No newline at end of file diff --git a/2019/5xxx/CVE-2019-5142.json b/2019/5xxx/CVE-2019-5142.json index 48428c97a37..d8ad2e0c650 100644 --- a/2019/5xxx/CVE-2019-5142.json +++ b/2019/5xxx/CVE-2019-5142.json @@ -58,5 +58,13 @@ "value": "An exploitable command injection vulnerability exists in the hostname functionality of the Moxa AWK-3131A firmware version 1.13. A specially crafted entry to network configuration information can cause execution of arbitrary system commands, resulting in full control of the device. An attacker can send various authenticated requests to trigger this vulnerability." } ] + }, + "impact": { + "cvss": { + "baseScore": 7.2, + "baseSeverity": "High", + "vectorString": "CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H", + "version": "3.0" + } } } \ No newline at end of file diff --git a/2019/5xxx/CVE-2019-5143.json b/2019/5xxx/CVE-2019-5143.json index 4aee9b90309..1feeab7c19d 100644 --- a/2019/5xxx/CVE-2019-5143.json +++ b/2019/5xxx/CVE-2019-5143.json @@ -58,5 +58,13 @@ "value": "An exploitable format string vulnerability exists in the iw_console conio_writestr functionality of the Moxa AWK-3131A firmware version 1.13. A specially crafted time server entry can cause an overflow of the time server buffer, resulting in remote code execution. An attacker can send commands while authenticated as a low privilege user to trigger this vulnerability." } ] + }, + "impact": { + "cvss": { + "baseScore": 8.8, + "baseSeverity": "High", + "vectorString": "CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", + "version": "3.0" + } } } \ No newline at end of file diff --git a/2019/5xxx/CVE-2019-5144.json b/2019/5xxx/CVE-2019-5144.json index 505ba0534bc..a1d7e644b33 100644 --- a/2019/5xxx/CVE-2019-5144.json +++ b/2019/5xxx/CVE-2019-5144.json @@ -58,5 +58,13 @@ "value": "An exploitable heap underflow vulnerability exists in the derive_taps_and_gains function in kdu_v7ar.dll of Kakadu Software SDK 7.10.2. A specially crafted jp2 file can cause a heap overflow, which can result in remote code execution. An attacker could provide a malformed file to the victim to trigger this vulnerability." } ] + }, + "impact": { + "cvss": { + "baseScore": 8.1, + "baseSeverity": "High", + "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H", + "version": "3.1" + } } } \ No newline at end of file diff --git a/2019/5xxx/CVE-2019-5145.json b/2019/5xxx/CVE-2019-5145.json index de7caf816ea..d32228c6f42 100644 --- a/2019/5xxx/CVE-2019-5145.json +++ b/2019/5xxx/CVE-2019-5145.json @@ -58,5 +58,13 @@ "value": "An exploitable use-after-free vulnerability exists in the JavaScript engine of Foxit PDF Reader, version 9.7.0.29435. A specially crafted PDF document can trigger a previously freed object in memory to be reused, resulting in arbitrary code execution. An attacker needs to trick the user to open the malicious file to trigger this vulnerability. If the browser plugin extension is enabled, visiting a malicious site can also trigger the vulnerability." } ] + }, + "impact": { + "cvss": { + "baseScore": 8.8, + "baseSeverity": "High", + "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", + "version": "3.0" + } } } \ No newline at end of file diff --git a/2019/5xxx/CVE-2019-5148.json b/2019/5xxx/CVE-2019-5148.json index e66165702d0..29f5f0e6418 100644 --- a/2019/5xxx/CVE-2019-5148.json +++ b/2019/5xxx/CVE-2019-5148.json @@ -58,5 +58,13 @@ "value": "An exploitable denial-of-service vulnerability exists in ServiceAgent functionality of the Moxa AWK-3131A, firmware version 1.13. A specially crafted packet can cause an integer underflow, triggering a large memcpy that will access unmapped or out-of-bounds memory. An attacker can send this packet while unauthenticated to trigger this vulnerability." } ] + }, + "impact": { + "cvss": { + "baseScore": 7.5, + "baseSeverity": "High", + "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", + "version": "3.0" + } } } \ No newline at end of file diff --git a/2019/5xxx/CVE-2019-5150.json b/2019/5xxx/CVE-2019-5150.json index 9a965fad60b..4b10f4c019d 100644 --- a/2019/5xxx/CVE-2019-5150.json +++ b/2019/5xxx/CVE-2019-5150.json @@ -58,5 +58,13 @@ "value": "An exploitable SQL injection vulnerability exist in YouPHPTube 7.7. When the \"VideoTags\" plugin is enabled, a specially crafted unauthenticated HTTP request can cause a SQL injection, possibly leading to denial of service, exfiltration of the database and local file inclusion, which could potentially further lead to code execution. An attacker can send an HTTP request to trigger this vulnerability." } ] + }, + "impact": { + "cvss": { + "baseScore": 8.9, + "baseSeverity": "High", + "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:L/A:H", + "version": "3.1" + } } } \ No newline at end of file diff --git a/2019/5xxx/CVE-2019-5151.json b/2019/5xxx/CVE-2019-5151.json index dc5915d3fbe..202adf67281 100644 --- a/2019/5xxx/CVE-2019-5151.json +++ b/2019/5xxx/CVE-2019-5151.json @@ -58,5 +58,13 @@ "value": "An exploitable SQL injection vulnerability exist in YouPHPTube 7.7. A specially crafted unauthenticated HTTP request can cause a SQL injection, possibly leading to denial of service, exfiltration of the database and local file inclusion, which could potentially further lead to code execution. An attacker can send an HTTP request to trigger this vulnerability." } ] + }, + "impact": { + "cvss": { + "baseScore": 10.0, + "baseSeverity": null, + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:L/A:H", + "version": "3.1" + } } } \ No newline at end of file diff --git a/2019/5xxx/CVE-2019-5152.json b/2019/5xxx/CVE-2019-5152.json index 5201eda7129..62152f66e86 100644 --- a/2019/5xxx/CVE-2019-5152.json +++ b/2019/5xxx/CVE-2019-5152.json @@ -58,5 +58,13 @@ "value": "An exploitable information disclosure vulnerability exists in the network packet handling functionality of Shadowsocks-libev 3.3.2. When utilizing a Stream Cipher, a specially crafted set of network packets can cause an outbound connection from the server, resulting in information disclosure. An attacker can send arbitrary packets to trigger this vulnerability." } ] + }, + "impact": { + "cvss": { + "baseScore": 7.4, + "baseSeverity": "High", + "vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N", + "version": "3.0" + } } } \ No newline at end of file diff --git a/2019/5xxx/CVE-2019-5153.json b/2019/5xxx/CVE-2019-5153.json index a174ac93013..25a19429d7e 100644 --- a/2019/5xxx/CVE-2019-5153.json +++ b/2019/5xxx/CVE-2019-5153.json @@ -58,5 +58,13 @@ "value": "An exploitable remote code execution vulnerability exists in the iw_webs configuration parsing functionality of the Moxa AWK-3131A firmware version 1.13. A specially crafted user name entry can cause an overflow of an error message buffer, resulting in remote code execution. An attacker can send commands while authenticated as a low privilege user to trigger this vulnerability." } ] + }, + "impact": { + "cvss": { + "baseScore": 9.9, + "baseSeverity": "Critical", + "vectorString": "CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H", + "version": "3.0" + } } } \ No newline at end of file diff --git a/2019/5xxx/CVE-2019-5154.json b/2019/5xxx/CVE-2019-5154.json index edcbb166691..ee64b5dfdc0 100644 --- a/2019/5xxx/CVE-2019-5154.json +++ b/2019/5xxx/CVE-2019-5154.json @@ -58,5 +58,13 @@ "value": "An exploitable heap overflow vulnerability exists in the JPEG2000 parsing functionality of LEADTOOLS 20.0.2019.3.15. A specially crafted J2K image file can cause an out of bounds write of a null byte in a heap buffer, potentially resulting in code execution. An attack can specially craft a J2K image to trigger this vulnerability." } ] + }, + "impact": { + "cvss": { + "baseScore": 8.8, + "baseSeverity": "High", + "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", + "version": "3.0" + } } } \ No newline at end of file diff --git a/2019/5xxx/CVE-2019-5162.json b/2019/5xxx/CVE-2019-5162.json index 1eafc6b0e4e..22c5631bbdd 100644 --- a/2019/5xxx/CVE-2019-5162.json +++ b/2019/5xxx/CVE-2019-5162.json @@ -58,5 +58,13 @@ "value": "An exploitable improper access control vulnerability exists in the iw_webs account settings functionality of the Moxa AWK-3131A firmware version 1.13. A specially crafted user name entry can cause the overwrite of an existing user account password, resulting in remote shell access to the device as that user. An attacker can send commands while authenticated as a low privilege user to trigger this vulnerability." } ] + }, + "impact": { + "cvss": { + "baseScore": 9.9, + "baseSeverity": "Critical", + "vectorString": "CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H", + "version": "3.0" + } } } \ No newline at end of file diff --git a/2019/5xxx/CVE-2019-5163.json b/2019/5xxx/CVE-2019-5163.json index de3a07e5d25..813c98b3d57 100644 --- a/2019/5xxx/CVE-2019-5163.json +++ b/2019/5xxx/CVE-2019-5163.json @@ -68,5 +68,13 @@ "value": "An exploitable denial-of-service vulnerability exists in the UDPRelay functionality of Shadowsocks-libev 3.3.2. When utilizing a Stream Cipher and a local_address, arbitrary UDP packets can cause a FATAL error code path and exit. An attacker can send arbitrary UDP packets to trigger this vulnerability." } ] + }, + "impact": { + "cvss": { + "baseScore": 5.9, + "baseSeverity": "Medium", + "vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H", + "version": "3.0" + } } } \ No newline at end of file diff --git a/2019/5xxx/CVE-2019-5164.json b/2019/5xxx/CVE-2019-5164.json index e63cfb1a6cb..c11d1e18900 100644 --- a/2019/5xxx/CVE-2019-5164.json +++ b/2019/5xxx/CVE-2019-5164.json @@ -68,5 +68,13 @@ "value": "An exploitable code execution vulnerability exists in the ss-manager binary of Shadowsocks-libev 3.3.2. Specially crafted network packets sent to ss-manager can cause an arbitrary binary to run, resulting in code execution and privilege escalation. An attacker can send network packets to trigger this vulnerability." } ] + }, + "impact": { + "cvss": { + "baseScore": 7.8, + "baseSeverity": "High", + "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", + "version": "3.0" + } } } \ No newline at end of file diff --git a/2019/5xxx/CVE-2019-5165.json b/2019/5xxx/CVE-2019-5165.json index 3e2a98a6bdb..888eb46abea 100644 --- a/2019/5xxx/CVE-2019-5165.json +++ b/2019/5xxx/CVE-2019-5165.json @@ -58,5 +58,13 @@ "value": "An exploitable authentication bypass vulnerability exists in the hostname processing of the Moxa AWK-3131A firmware version 1.13. A specially configured device hostname can cause the device to interpret select remote traffic as local traffic, resulting in a bypass of web authentication. An attacker can send authenticated SNMP requests to trigger this vulnerability." } ] + }, + "impact": { + "cvss": { + "baseScore": 8.0, + "baseSeverity": "High", + "vectorString": "CVSS:3.0/AV:N/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:H", + "version": "3.0" + } } } \ No newline at end of file diff --git a/2019/5xxx/CVE-2019-5187.json b/2019/5xxx/CVE-2019-5187.json index 937033d549f..0f4c0fa183c 100644 --- a/2019/5xxx/CVE-2019-5187.json +++ b/2019/5xxx/CVE-2019-5187.json @@ -58,5 +58,13 @@ "value": "An exploitable out-of-bounds write vulnerability exists in the TIFreadstripdata function of the igcore19d.dll library of Accusoft ImageGear 19.5.0. A specially crafted TIFF file file can cause an out-of-bounds write, resulting in a remote code execution. An attacker needs to provide a malformed file to the victim to trigger the vulnerability." } ] + }, + "impact": { + "cvss": { + "baseScore": 9.8, + "baseSeverity": "Critical", + "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "version": "3.0" + } } } \ No newline at end of file diff --git a/2019/5xxx/CVE-2019-5188.json b/2019/5xxx/CVE-2019-5188.json index 83203ed8197..fa5fa89db76 100644 --- a/2019/5xxx/CVE-2019-5188.json +++ b/2019/5xxx/CVE-2019-5188.json @@ -88,5 +88,13 @@ "value": "A code execution vulnerability exists in the directory rehashing functionality of E2fsprogs e2fsck 1.45.4. A specially crafted ext4 directory can cause an out-of-bounds write on the stack, resulting in code execution. An attacker can corrupt a partition to trigger this vulnerability." } ] + }, + "impact": { + "cvss": { + "baseScore": 7.5, + "baseSeverity": "High", + "vectorString": "CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:H", + "version": "3.1" + } } } \ No newline at end of file diff --git a/2020/13xxx/CVE-2020-13542.json b/2020/13xxx/CVE-2020-13542.json index 6ce90812cbf..cec00ab9776 100644 --- a/2020/13xxx/CVE-2020-13542.json +++ b/2020/13xxx/CVE-2020-13542.json @@ -58,5 +58,13 @@ "value": "A local privilege elevation vulnerability exists in the file system permissions of LogicalDoc 8.5.1 installation. Depending on the vector chosen, an attacker can either replace the service binary or replace DLL files loaded by the service, both which get executed by a service thus executing arbitrary commands with System privileges." } ] + }, + "impact": { + "cvss": { + "baseScore": 9.3, + "baseSeverity": "Critical", + "vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H", + "version": "3.0" + } } } \ No newline at end of file diff --git a/2020/13xxx/CVE-2020-13543.json b/2020/13xxx/CVE-2020-13543.json index 9a5cbcfe41f..ce4ed7ef98b 100644 --- a/2020/13xxx/CVE-2020-13543.json +++ b/2020/13xxx/CVE-2020-13543.json @@ -63,5 +63,13 @@ "value": "A code execution vulnerability exists in the WebSocket functionality of Webkit WebKitGTK 2.30.0. A specially crafted web page can trigger a use-after-free vulnerability which can lead to remote code execution. An attacker can get a user to visit a webpage to trigger this vulnerability." } ] + }, + "impact": { + "cvss": { + "baseScore": 8.8, + "baseSeverity": "High", + "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", + "version": "3.0" + } } } \ No newline at end of file diff --git a/2020/13xxx/CVE-2020-13584.json b/2020/13xxx/CVE-2020-13584.json index f2d1ad92c40..736ee3c0a29 100644 --- a/2020/13xxx/CVE-2020-13584.json +++ b/2020/13xxx/CVE-2020-13584.json @@ -68,5 +68,13 @@ "value": "An exploitable use-after-free vulnerability exists in WebKitGTK browser version 2.30.1 x64. A specially crafted HTML web page can cause a use-after-free condition, resulting in a remote code execution. The victim needs to visit a malicious web site to trigger this vulnerability." } ] + }, + "impact": { + "cvss": { + "baseScore": 8.8, + "baseSeverity": "High", + "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", + "version": "3.0" + } } } \ No newline at end of file diff --git a/2020/28xxx/CVE-2020-28596.json b/2020/28xxx/CVE-2020-28596.json index d0944b7df65..0e0fd6d7c6a 100644 --- a/2020/28xxx/CVE-2020-28596.json +++ b/2020/28xxx/CVE-2020-28596.json @@ -58,5 +58,13 @@ "value": "A stack-based buffer overflow vulnerability exists in the Objparser::objparse() functionality of Prusa Research PrusaSlicer 2.2.0 and Master (commit 4b040b856). A specially crafted obj file can lead to code execution. An attacker can provide a malicious file to trigger this vulnerability." } ] + }, + "impact": { + "cvss": { + "baseScore": 8.8, + "baseSeverity": "High", + "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", + "version": "3.0" + } } } \ No newline at end of file diff --git a/2020/6xxx/CVE-2020-6058.json b/2020/6xxx/CVE-2020-6058.json index a5a970fe279..7282ec65c52 100644 --- a/2020/6xxx/CVE-2020-6058.json +++ b/2020/6xxx/CVE-2020-6058.json @@ -58,5 +58,13 @@ "value": "An exploitable out-of-bounds read vulnerability exists in the way MiniSNMPD version 1.4 parses incoming SNMP packets. A specially crafted SNMP request can trigger an out-of-bounds memory read, which can result in the disclosure of sensitive information and denial of service. To trigger this vulnerability, an attacker needs to send a specially crafted packet to the vulnerable server." } ] + }, + "impact": { + "cvss": { + "baseScore": 8.2, + "baseSeverity": "High", + "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:H", + "version": "3.0" + } } } \ No newline at end of file diff --git a/2020/6xxx/CVE-2020-6059.json b/2020/6xxx/CVE-2020-6059.json index 2849ed38486..ed35343d313 100644 --- a/2020/6xxx/CVE-2020-6059.json +++ b/2020/6xxx/CVE-2020-6059.json @@ -63,5 +63,13 @@ "value": "An exploitable out of bounds read vulnerability exists in the way MiniSNMPD version 1.4 parses incoming SNMP packets. A specially crafted SNMP request can trigger an out of bounds memory read which can result in sensitive information disclosure and Denial Of Service. In order to trigger this vulnerability, an attacker needs to send a specially crafted packet to the vulnerable server." } ] + }, + "impact": { + "cvss": { + "baseScore": 8.2, + "baseSeverity": "High", + "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:H", + "version": "3.0" + } } } \ No newline at end of file diff --git a/2020/6xxx/CVE-2020-6060.json b/2020/6xxx/CVE-2020-6060.json index c22293b1b74..713b7e7c1f4 100644 --- a/2020/6xxx/CVE-2020-6060.json +++ b/2020/6xxx/CVE-2020-6060.json @@ -63,5 +63,13 @@ "value": "A stack buffer overflow vulnerability exists in the way MiniSNMPD version 1.4 handles multiple connections. A specially timed sequence of SNMP connections can trigger a stack overflow, resulting in a denial of service. To trigger this vulnerability, an attacker needs to simply initiate multiple connections to the server." } ] + }, + "impact": { + "cvss": { + "baseScore": 7.5, + "baseSeverity": "High", + "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", + "version": "3.0" + } } } \ No newline at end of file diff --git a/2020/6xxx/CVE-2020-6061.json b/2020/6xxx/CVE-2020-6061.json index db7e1b2b817..0b64c0aa584 100644 --- a/2020/6xxx/CVE-2020-6061.json +++ b/2020/6xxx/CVE-2020-6061.json @@ -83,5 +83,13 @@ "value": "An exploitable heap out-of-bounds read vulnerability exists in the way CoTURN 4.5.1.1 web server parses POST requests. A specially crafted HTTP POST request can lead to information leaks and other misbehavior. An attacker needs to send an HTTPS request to trigger this vulnerability." } ] + }, + "impact": { + "cvss": { + "baseScore": 7.0, + "baseSeverity": "High", + "vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:H", + "version": "3.0" + } } } \ No newline at end of file diff --git a/2020/6xxx/CVE-2020-6062.json b/2020/6xxx/CVE-2020-6062.json index af67cb1a3f1..da500a0f01e 100644 --- a/2020/6xxx/CVE-2020-6062.json +++ b/2020/6xxx/CVE-2020-6062.json @@ -83,5 +83,13 @@ "value": "An exploitable denial-of-service vulnerability exists in the way CoTURN 4.5.1.1 web server parses POST requests. A specially crafted HTTP POST request can lead to server crash and denial of service. An attacker needs to send an HTTP request to trigger this vulnerability." } ] + }, + "impact": { + "cvss": { + "baseScore": 5.9, + "baseSeverity": "Medium", + "vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H", + "version": "3.0" + } } } \ No newline at end of file diff --git a/2020/6xxx/CVE-2020-6063.json b/2020/6xxx/CVE-2020-6063.json index b3d6f086c9c..1772d57eb4a 100644 --- a/2020/6xxx/CVE-2020-6063.json +++ b/2020/6xxx/CVE-2020-6063.json @@ -58,5 +58,13 @@ "value": "An exploitable out-of-bounds write vulnerability exists in the uncompress_scan_line function of the igcore19d.dll library of Accusoft ImageGear, version 19.5.0. A specially crafted PCX file can cause an out-of-bounds write, resulting in a remote code execution. An attacker needs to provide a malformed file to the victim to trigger the vulnerability." } ] + }, + "impact": { + "cvss": { + "baseScore": 9.8, + "baseSeverity": "Critical", + "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "version": "3.0" + } } } \ No newline at end of file diff --git a/2020/6xxx/CVE-2020-6064.json b/2020/6xxx/CVE-2020-6064.json index 1b5f4dccf55..4edf8c5cf22 100644 --- a/2020/6xxx/CVE-2020-6064.json +++ b/2020/6xxx/CVE-2020-6064.json @@ -58,5 +58,13 @@ "value": "An exploitable out-of-bounds write vulnerability exists in the uncompress_scan_line function of the igcore19d.dll library of Accusoft ImageGear, version 19.5.0. A specially crafted PCX file can cause an out-of-bounds write, resulting in a remote code execution. An attacker needs to provide a malformed file to the victim to trigger the vulnerability." } ] + }, + "impact": { + "cvss": { + "baseScore": 9.8, + "baseSeverity": "Critical", + "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "version": "3.0" + } } } \ No newline at end of file diff --git a/2020/6xxx/CVE-2020-6065.json b/2020/6xxx/CVE-2020-6065.json index 1427c01e149..bf5d468d862 100644 --- a/2020/6xxx/CVE-2020-6065.json +++ b/2020/6xxx/CVE-2020-6065.json @@ -58,5 +58,13 @@ "value": "An exploitable out-of-bounds write vulnerability exists in the bmp_parsing function of the igcore19d.dll library of Accusoft ImageGear, version 19.5.0. A specially crafted BMP file can cause an out-of-bounds write, resulting in a remote code execution. An attacker needs to provide a malformed file to the victim to trigger the vulnerability." } ] + }, + "impact": { + "cvss": { + "baseScore": 9.8, + "baseSeverity": "Critical", + "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "version": "3.0" + } } } \ No newline at end of file diff --git a/2020/6xxx/CVE-2020-6066.json b/2020/6xxx/CVE-2020-6066.json index 9fa3c1f272a..e939adcb9f2 100644 --- a/2020/6xxx/CVE-2020-6066.json +++ b/2020/6xxx/CVE-2020-6066.json @@ -58,5 +58,13 @@ "value": "An exploitable out-of-bounds write vulnerability exists in the igcore19d.dll JPEG SOFx parser of the Accusoft ImageGear 19.5.0 library. A specially crafted JPEG file can cause an out-of-bounds write, resulting in a remote code execution. An attacker needs to provide a malformed file to the victim to trigger the vulnerability." } ] + }, + "impact": { + "cvss": { + "baseScore": 9.8, + "baseSeverity": "Critical", + "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "version": "3.0" + } } } \ No newline at end of file diff --git a/2020/6xxx/CVE-2020-6067.json b/2020/6xxx/CVE-2020-6067.json index f9feb98e0bc..6888a12d028 100644 --- a/2020/6xxx/CVE-2020-6067.json +++ b/2020/6xxx/CVE-2020-6067.json @@ -58,5 +58,13 @@ "value": "An exploitable out-of-bounds write vulnerability exists in the igcore19d.dll TIFF tifread parser of the Accusoft ImageGear 19.5.0 library. A specially crafted TIFF file can cause an out-of-bounds write, resulting in a remote code execution. An attacker needs to provide a malformed file to the victim to trigger the vulnerability." } ] + }, + "impact": { + "cvss": { + "baseScore": 9.8, + "baseSeverity": "Critical", + "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "version": "3.0" + } } } \ No newline at end of file diff --git a/2020/6xxx/CVE-2020-6068.json b/2020/6xxx/CVE-2020-6068.json index 111d7cfd349..90b94b5a6ca 100644 --- a/2020/6xxx/CVE-2020-6068.json +++ b/2020/6xxx/CVE-2020-6068.json @@ -58,5 +58,13 @@ "value": "An exploitable out-of-bounds write vulnerability exists in the igcore19d.dll PNG pngread parser of the Accusoft ImageGear 19.5.0 library. A specially crafted PNG file can cause an out-of-bounds write, resulting in a remote code execution. An attacker needs to provide a malformed file to the victim to trigger the vulnerability." } ] + }, + "impact": { + "cvss": { + "baseScore": 9.8, + "baseSeverity": "Critical", + "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "version": "3.0" + } } } \ No newline at end of file diff --git a/2020/6xxx/CVE-2020-6069.json b/2020/6xxx/CVE-2020-6069.json index 0854e320574..38517011a5b 100644 --- a/2020/6xxx/CVE-2020-6069.json +++ b/2020/6xxx/CVE-2020-6069.json @@ -58,5 +58,13 @@ "value": "An exploitable out-of-bounds write vulnerability exists in the igcore19d.dll JPEG jpegread precision parser of the Accusoft ImageGear 19.5.0 library. A specially crafted JPEG file can cause an out-of-bounds write, resulting in a remote code execution. An attacker needs to provide a malformed file to the victim to trigger the vulnerability." } ] + }, + "impact": { + "cvss": { + "baseScore": 9.8, + "baseSeverity": "Critical", + "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "version": "3.0" + } } } \ No newline at end of file diff --git a/2020/6xxx/CVE-2020-6070.json b/2020/6xxx/CVE-2020-6070.json index 4d0e5179108..55b574012cb 100644 --- a/2020/6xxx/CVE-2020-6070.json +++ b/2020/6xxx/CVE-2020-6070.json @@ -63,5 +63,13 @@ "value": "An exploitable code execution vulnerability exists in the file system checking functionality of fsck.f2fs 1.12.0. A specially crafted f2fs file can cause a logic flaw and out-of-bounds heap operations, resulting in code execution. An attacker can provide a malicious file to trigger this vulnerability." } ] + }, + "impact": { + "cvss": { + "baseScore": 6.7, + "baseSeverity": "Medium", + "vectorString": "CVSS:3.0/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H", + "version": "3.0" + } } } \ No newline at end of file diff --git a/2020/6xxx/CVE-2020-6071.json b/2020/6xxx/CVE-2020-6071.json index 5900c2dc2e4..932c07d343c 100644 --- a/2020/6xxx/CVE-2020-6071.json +++ b/2020/6xxx/CVE-2020-6071.json @@ -68,5 +68,13 @@ "value": "An exploitable denial-of-service vulnerability exists in the resource record-parsing functionality of Videolabs libmicrodns 0.1.0. When parsing compressed labels in mDNS messages, the compression pointer is followed without checking for recursion, leading to a denial of service. An attacker can send an mDNS message to trigger this vulnerability." } ] + }, + "impact": { + "cvss": { + "baseScore": 7.5, + "baseSeverity": "High", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", + "version": "3.1" + } } } \ No newline at end of file diff --git a/2020/6xxx/CVE-2020-6072.json b/2020/6xxx/CVE-2020-6072.json index 6089af3173e..dd457ab84c1 100644 --- a/2020/6xxx/CVE-2020-6072.json +++ b/2020/6xxx/CVE-2020-6072.json @@ -68,5 +68,13 @@ "value": "An exploitable code execution vulnerability exists in the label-parsing functionality of Videolabs libmicrodns 0.1.0. When parsing compressed labels in mDNS messages, the rr_decode function's return value is not checked, leading to a double free that could be exploited to execute arbitrary code. An attacker can send an mDNS message to trigger this vulnerability." } ] + }, + "impact": { + "cvss": { + "baseScore": 9.8, + "baseSeverity": "Critical", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "version": "3.1" + } } } \ No newline at end of file diff --git a/2020/6xxx/CVE-2020-6073.json b/2020/6xxx/CVE-2020-6073.json index 9a4a5b9b3a8..836de5e088d 100644 --- a/2020/6xxx/CVE-2020-6073.json +++ b/2020/6xxx/CVE-2020-6073.json @@ -68,5 +68,13 @@ "value": "An exploitable denial-of-service vulnerability exists in the TXT record-parsing functionality of Videolabs libmicrodns 0.1.0. When parsing the RDATA section in a TXT record in mDNS messages, multiple integer overflows can be triggered, leading to a denial of service. An attacker can send an mDNS message to trigger this vulnerability." } ] + }, + "impact": { + "cvss": { + "baseScore": 7.5, + "baseSeverity": "High", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", + "version": "3.1" + } } } \ No newline at end of file diff --git a/2020/6xxx/CVE-2020-6074.json b/2020/6xxx/CVE-2020-6074.json index 67a6c5e0721..fcb7a128a67 100644 --- a/2020/6xxx/CVE-2020-6074.json +++ b/2020/6xxx/CVE-2020-6074.json @@ -58,5 +58,13 @@ "value": "An exploitable code execution vulnerability exists in the PDF parser of Nitro Pro 13.9.1.155. A specially crafted PDF document can cause a use-after-free which can lead to remote code execution. An attacker can provide a malicious file to trigger this vulnerability." } ] + }, + "impact": { + "cvss": { + "baseScore": 8.8, + "baseSeverity": "High", + "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", + "version": "3.0" + } } } \ No newline at end of file diff --git a/2020/6xxx/CVE-2020-6075.json b/2020/6xxx/CVE-2020-6075.json index 965964744ce..2303a7844bf 100644 --- a/2020/6xxx/CVE-2020-6075.json +++ b/2020/6xxx/CVE-2020-6075.json @@ -58,5 +58,13 @@ "value": "An exploitable out-of-bounds write vulnerability exists in the store_data_buffer function of the igcore19d.dll library of Accusoft ImageGear 19.5.0. A specially crafted PNG file can cause an out-of-bounds write, resulting in a remote code execution. An attacker needs to provide a malformed file to the victim to trigger the vulnerability." } ] + }, + "impact": { + "cvss": { + "baseScore": 9.8, + "baseSeverity": "Critical", + "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "version": "3.0" + } } } \ No newline at end of file diff --git a/2020/6xxx/CVE-2020-6076.json b/2020/6xxx/CVE-2020-6076.json index 8ccf5b6fc7f..93c1239638b 100644 --- a/2020/6xxx/CVE-2020-6076.json +++ b/2020/6xxx/CVE-2020-6076.json @@ -58,5 +58,13 @@ "value": "An exploitable out-of-bounds write vulnerability exists in the igcore19d.dll ICO icoread parser of the Accusoft ImageGear 19.5.0 library. A specially crafted ICO file can cause an out-of-bounds write, resulting in a remote code execution. An attacker needs to provide a malformed file to the victim to trigger the vulnerability." } ] + }, + "impact": { + "cvss": { + "baseScore": 9.8, + "baseSeverity": "Critical", + "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "version": "3.0" + } } } \ No newline at end of file diff --git a/2020/6xxx/CVE-2020-6077.json b/2020/6xxx/CVE-2020-6077.json index 635ab5fea31..4e6902947dd 100644 --- a/2020/6xxx/CVE-2020-6077.json +++ b/2020/6xxx/CVE-2020-6077.json @@ -68,5 +68,13 @@ "value": "An exploitable denial-of-service vulnerability exists in the message-parsing functionality of Videolabs libmicrodns 0.1.0. When parsing mDNS messages, the implementation does not properly keep track of the available data in the message, possibly leading to an out-of-bounds read that would result in a denial of service. An attacker can send an mDNS message to trigger this vulnerability." } ] + }, + "impact": { + "cvss": { + "baseScore": 7.5, + "baseSeverity": "High", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", + "version": "3.1" + } } } \ No newline at end of file diff --git a/2020/6xxx/CVE-2020-6078.json b/2020/6xxx/CVE-2020-6078.json index b3e959ba0d7..0bec1ad36d0 100644 --- a/2020/6xxx/CVE-2020-6078.json +++ b/2020/6xxx/CVE-2020-6078.json @@ -68,5 +68,13 @@ "value": "An exploitable denial-of-service vulnerability exists in the message-parsing functionality of Videolabs libmicrodns 0.1.0. When parsing mDNS messages in mdns_recv, the return value of the mdns_read_header function is not checked, leading to an uninitialized variable usage that eventually results in a null pointer dereference, leading to service crash. An attacker can send a series of mDNS messages to trigger this vulnerability." } ] + }, + "impact": { + "cvss": { + "baseScore": 7.5, + "baseSeverity": "High", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", + "version": "3.1" + } } } \ No newline at end of file diff --git a/2020/6xxx/CVE-2020-6079.json b/2020/6xxx/CVE-2020-6079.json index 576619a74bd..4a1643b79b9 100644 --- a/2020/6xxx/CVE-2020-6079.json +++ b/2020/6xxx/CVE-2020-6079.json @@ -68,5 +68,13 @@ "value": "An exploitable denial-of-service vulnerability exists in the resource allocation handling of Videolabs libmicrodns 0.1.0. When encountering errors while parsing mDNS messages, some allocated data is not freed, possibly leading to a denial-of-service condition via resource exhaustion. An attacker can send one mDNS message repeatedly to trigger this vulnerability through decoding of the domain name performed by rr_decode." } ] + }, + "impact": { + "cvss": { + "baseScore": 7.5, + "baseSeverity": "High", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", + "version": "3.1" + } } } \ No newline at end of file diff --git a/2020/6xxx/CVE-2020-6080.json b/2020/6xxx/CVE-2020-6080.json index dcc9f99f5e8..ed9d0b9a52f 100644 --- a/2020/6xxx/CVE-2020-6080.json +++ b/2020/6xxx/CVE-2020-6080.json @@ -68,5 +68,13 @@ "value": "An exploitable denial-of-service vulnerability exists in the resource allocation handling of Videolabs libmicrodns 0.1.0. When encountering errors while parsing mDNS messages, some allocated data is not freed, possibly leading to a denial-of-service condition via resource exhaustion. An attacker can send one mDNS message repeatedly to trigger this vulnerability through the function rr_read_RR [5] reads the current resource record, except for the RDATA section. This is read by the loop at in rr_read. For each RR type, a different function is called. When the RR type is 0x10, the function rr_read_TXT is called at [6]." } ] + }, + "impact": { + "cvss": { + "baseScore": 7.5, + "baseSeverity": "High", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", + "version": "3.1" + } } } \ No newline at end of file diff --git a/2020/6xxx/CVE-2020-6081.json b/2020/6xxx/CVE-2020-6081.json index 4d9f9e350fd..71c934ac2a1 100644 --- a/2020/6xxx/CVE-2020-6081.json +++ b/2020/6xxx/CVE-2020-6081.json @@ -58,5 +58,13 @@ "value": "An exploitable code execution vulnerability exists in the PLC_Task functionality of 3S-Smart Software Solutions GmbH CODESYS Runtime 3.5.14.30. A specially crafted network request can cause remote code execution. An attacker can send a malicious packet to trigger this vulnerability." } ] + }, + "impact": { + "cvss": { + "baseScore": 9.9, + "baseSeverity": "Critical", + "vectorString": "CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H", + "version": "3.0" + } } } \ No newline at end of file diff --git a/2020/6xxx/CVE-2020-6082.json b/2020/6xxx/CVE-2020-6082.json index d0f5db81a78..0ce5e312ff3 100644 --- a/2020/6xxx/CVE-2020-6082.json +++ b/2020/6xxx/CVE-2020-6082.json @@ -58,5 +58,13 @@ "value": "An exploitable out-of-bounds write vulnerability exists in the ico_read function of the igcore19d.dll library of Accusoft ImageGear 19.6.0. A specially crafted ICO file can cause an out-of-bounds write, resulting in a remote code execution. An attacker needs to provide a malformed file to the victim to trigger the vulnerability." } ] + }, + "impact": { + "cvss": { + "baseScore": 9.8, + "baseSeverity": "Critical", + "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "version": "3.0" + } } } \ No newline at end of file